Hi Friends, I found small features in the powershell that allow you to do administrative capability with just a normal user. The Just Enough Administration

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Friends, I found small features in the powershell that allow you to do administrative capability with just a normal user. The Just Enough Administration
Hi friends, This configuration assumes that you have anough privilege to deploy pod to the cluster. There are many ways to gather initial information propbably
Hi Brother, Another privilege escalation using docker or sandbox escape. The methodology is the same which we need to start a docker image with privileged
Hi Pentester, Today virtualization with docker is getting interesting for most of the developer to race on making their application compatible to run within docker.
Hi Pentester, I want to share a post exploitation of privilege escalation on the Boot2Docker virtualization. Missed configuration lead to the success of this exploitation.
Another day playing with JWT. I found another way to compromise JWT session during my pentest exercise. During the web enumeration, I found that the