Tag

Privilege Escalation

1 views collected around this technical thread.

Raymond Ops
Raymond Ops
Apr 15, 2025 · Information Security

How to Exploit Docker for Linux Privilege Escalation – A Step‑by‑Step Guide

This article walks through Docker privilege escalation techniques on Linux, covering Docker basics, permission discovery, manual and automated enumeration with LinPEAS, and three practical breakout scenarios—including abusing Docker group rights, escaping privileged containers, and breaking out of non‑privileged containers using SUID binaries and release_agent attacks.

Container SecurityDockerLinPEAS
0 likes · 25 min read
How to Exploit Docker for Linux Privilege Escalation – A Step‑by‑Step Guide
Raymond Ops
Raymond Ops
Mar 28, 2025 · Information Security

Uncover Hidden Passwords on Linux: From File Scans to Hash Cracking

This guide walks you through systematic Linux password hunting techniques—including searching filenames, scanning file contents, extracting credentials from web and config files, cracking hashes with Hashcat and John, leveraging hidden files, MySQL databases, backup archives, and automating discovery with LinPEAS—to elevate privileges and gain full root access.

HashcatInformation SecurityJohn the Ripper
0 likes · 30 min read
Uncover Hidden Passwords on Linux: From File Scans to Hash Cracking
Efficient Ops
Efficient Ops
Oct 14, 2024 · Operations

Mastering su vs sudo: When and How to Switch Users on Linux

This guide clarifies the differences between the Linux commands su and sudo, explains their options and effects on the shell environment, shows how to create and manage users, edit the sudoers file, and choose the appropriate method for secure privilege escalation.

LinuxPrivilege EscalationSystem Administration
0 likes · 14 min read
Mastering su vs sudo: When and How to Switch Users on Linux
Aikesheng Open Source Community
Aikesheng Open Source Community
Mar 19, 2024 · Information Security

Risks of Granting MySQL Authentication Table Permissions and How to Mitigate Them

The article explains how granting ordinary MySQL users full access to authentication tables can lead to severe privilege‑escalation risks, demonstrates the issue with concrete scenarios, and provides mitigation strategies including the use of MySQL 8.0 partial revokes and the principle of least privilege.

Access ControlDatabaseInformation Security
0 likes · 9 min read
Risks of Granting MySQL Authentication Table Permissions and How to Mitigate Them
Java Architect Essentials
Java Architect Essentials
May 26, 2023 · Information Security

Step‑by‑Step WordPress Site Penetration Testing Tutorial

This tutorial walks beginners through the entire process of compromising a WordPress website, from initial information gathering and DNS enumeration to vulnerability scanning, exploitation with tools like sqlmap and nmap, privilege escalation, and establishing persistent backdoors.

Information SecurityPrivilege EscalationWebShell
0 likes · 10 min read
Step‑by‑Step WordPress Site Penetration Testing Tutorial
360 Quality & Efficiency
360 Quality & Efficiency
Apr 7, 2023 · Information Security

Understanding Windows User Permissions, Privilege Dropping, and Elevation (UAC)

This article explains Windows user permission types, inheritance, the concepts of privilege dropping and elevation, how Explorer.exe can be used for privilege reduction, and the role of UAC and ShellExecute/ShellExecuteEx APIs in managing application security.

ExplorerPermissionsPrivilege Escalation
0 likes · 7 min read
Understanding Windows User Permissions, Privilege Dropping, and Elevation (UAC)
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Oct 21, 2022 · Information Security

DirtyPipe (CVE‑2022‑0847) Vulnerability Analysis and Exploitation on Android/Linux

DirtyPipe (CVE‑2022‑0847) is a high‑severity Linux kernel flaw that lets attackers arbitrarily overwrite any readable file via an uninitialized pipe‑buffer flag, enabling privilege escalation on Android and other systems by patching shared libraries, bypassing SELinux, loading malicious modules, and ultimately gaining root, highlighting urgent need for patches and integrity protections.

Android securityCVE-2022-0847DirtyPipe
0 likes · 17 min read
DirtyPipe (CVE‑2022‑0847) Vulnerability Analysis and Exploitation on Android/Linux
Laravel Tech Community
Laravel Tech Community
Sep 26, 2022 · Information Security

Privilege Escalation Vulnerability in Visual Studio Code < 1.71.1 (CVE-2022-38020)

Visual Studio Code versions prior to 1.71.1 contain a privilege‑escalation flaw where a low‑privileged Windows attacker can place a malicious bash.exe in a special directory, causing the editor to load and execute the file, and the issue is fixed by upgrading to version 1.71.1 or later.

CVE-2022-38020PatchPrivilege Escalation
0 likes · 2 min read
Privilege Escalation Vulnerability in Visual Studio Code < 1.71.1 (CVE-2022-38020)
Bilibili Tech
Bilibili Tech
Jun 17, 2022 · Information Security

Container Escape Techniques, Exploits, and Mitigation Strategies

The article explains how attackers can break out of Docker containers by exploiting misconfigurations, vulnerable Docker components, kernel bugs, or Kubernetes RBAC errors, illustrates real‑world exploits such as host‑proc mounts and CVE‑2019‑5736, and provides mitigation steps like limiting privileges, updating software, and securing configurations.

Container SecurityDockerNamespace
0 likes · 15 min read
Container Escape Techniques, Exploits, and Mitigation Strategies
Architect's Tech Stack
Architect's Tech Stack
Nov 15, 2021 · Operations

Understanding and Using the su and sudo Commands in Linux

This article systematically explains the differences, usage patterns, and practical examples of the Linux su and sudo commands, covering user creation, login‑shell vs non‑login‑shell switches, the -c option, sudoers configuration, and security considerations for privilege escalation.

LinuxPrivilege EscalationSystem Administration
0 likes · 13 min read
Understanding and Using the su and sudo Commands in Linux
php中文网 Courses
php中文网 Courses
Dec 18, 2020 · Information Security

ThinkCMF Privilege Escalation Vulnerability in ThinkPHP 5.0 and Its Mitigation

The article explains a privilege‑escalation flaw in the ThinkCMF CMS built on ThinkPHP 5.0, demonstrates how to exploit it via crafted URLs to invoke arbitrary PHP functions such as phpinfo, and describes the official fix that adds strict controller name validation.

Privilege EscalationThinkCMFThinkPHP
0 likes · 3 min read
ThinkCMF Privilege Escalation Vulnerability in ThinkPHP 5.0 and Its Mitigation
Tencent Cloud Developer
Tencent Cloud Developer
Feb 14, 2019 · Information Security

Critical runc Container Escape Vulnerability Advisory (CVE-2019-5736)

A critical CVE‑2019‑5736 vulnerability in the runc container runtime lets a malicious container overwrite the host’s runc binary, granting attackers root‑level code execution that can compromise other containers, the host system, and the network, with a CVSS 3.0 score of 7.2, affecting runc, Apache Mesos and LXC, and requiring prompt updates.

Container SecurityKernel SecurityPrivilege Escalation
0 likes · 3 min read
Critical runc Container Escape Vulnerability Advisory (CVE-2019-5736)
Efficient Ops
Efficient Ops
Oct 30, 2018 · Information Security

How a Former Ops Manager Illegally Escalated Privileges to Steal and Sell Code Worth 8 Million Yuan

In a 2018 Beijing police operation, a former operations supervisor illegally raised his system permissions, downloaded three proprietary project source codes from a tech company, and sold them for nearly eight million yuan, leading to the arrest of two suspects after extensive digital forensic investigation.

Case StudyInformation SecurityPrivilege Escalation
0 likes · 4 min read
How a Former Ops Manager Illegally Escalated Privileges to Steal and Sell Code Worth 8 Million Yuan
Efficient Ops
Efficient Ops
May 11, 2017 · Information Security

Mastering Linux Security: Real‑World Attack Vectors and Defense Strategies

This article shares practical insights from a security director at YY Live, detailing the complex Linux security landscape, common vulnerabilities, real‑world attack techniques such as Redis abuse and privilege escalation, and a multi‑layered defense approach that balances rapid business iteration with robust protection.

DDoS mitigationIntrusion DetectionLinux security
0 likes · 21 min read
Mastering Linux Security: Real‑World Attack Vectors and Defense Strategies