SGShubhankar Guptainshubhankargupta.hashnode.dev00Privilege Escalation via doas3d ago · 5 min read · In this blog, I’m going to explain how privilege escalation can happen using doas, and how misconfigurations can allow users to execute commands with elevated privileges. We’ll start with a quick overJoin discussion
SGShubhankar Guptainshubhankargupta.hashnode.dev00Weaponize .chm files with PowerShell NishangMay 6 · 4 min read · So in this tutorial, I’m gonna walk you through something that most people completely ignore but it can actually be pretty important. We’re talking about CHM files. Now I know… it sounds boring alreadJoin discussion
SGShubhankar Guptainshubhankargupta.hashnode.dev00Book HTB WalkThroughApr 17 · 15 min read · Welcome to another Hack the Box walkthrough. In this blog post, I have demonstrated how I owned the Book machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowledJoin discussion
SGShubhankar Guptainshubhankargupta.hashnode.dev00Bashed HTB WalkThroughApr 8 · 12 min read · Welcome to another Hack the Box walkthrough. In this blog post, I have demonstrated how I owned the Kobold machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowlJoin discussion
SGShubhankar Guptainshubhankargupta.hashnode.dev00Kobold HTB WalkThroughApr 1 · 9 min read · Welcome to another Hack the Box walkthrough. In this blog post, I have demonstrated how I owned the Kobold machine on Hack the Box. Hack The Box is a cybersecurity platform that helps you bridge knowlJoin discussion