👹
Hacker's Grimoire
  • Hacker's Grimoire
  • Reconnaissance
    • Passive information gathering
    • Active information gathering
  • Exploitation
    • Web application attacks
      • Local and remote file inclusion
      • File upload bypass
      • Cross-site scripting
      • Cross-site request forgery
      • Server-side request forgery
      • SQL injection
      • Remote code execution
    • Working with exploits
    • Password cracking
    • Metasploit
    • Buffer overflow
  • Post exploitation
    • Privilege escalation: Linux
    • Privilege escalation: Windows
  • Linux basics
  • Windows basics
  • Learning resources
Powered by GitBook
On this page

Post exploitation

Privilege escalation: LinuxPrivilege escalation: Windows
PreviousBuffer overflowNextPrivilege escalation: Linux

Last updated 2 years ago