Security Queens

    • Welcome 🚀
    • About Us ✨
      • Legacy Members
    • Blog 🤓
      • Rapid Reads
      • Awareness
      • Cloud
      • Cryptography
      • Development
      • Engineering
      • Learning Resources
      • Penetration Testing
      • Securiteenies
      • Special Interest
      • Technical Fundamentals
      • Web
    • Newsletter 🎉
    • Conferences 🎤
Skip to content

Bop to the Top: A Linux Priv Esc. Checklist

Estimated Difficulty: 💜💜💜💜🤍 Congratulations, you’ve got a foothold!Now what? Bop to the Top and get yourself some Root! The following blog will detail my own personal checklist that I run through when attempting to privilege escalate in a Linux environment. From my personal experience, it has a fairly good success

Read Details

I’m in Chroot Jail, Get Me Out of Here!

Estimated Difficulty: 💜💜💜💜🤍 So you’ve hacked it. You got root. Or do you? What is a chroot jail? Chroot jails can fool attackers to think that they supposedly have immediate root privilege access to the environment. Chroot in Unix operating systems help change the apparent root (chroot) directory. I guess

Read Details

Security Queens

  • Welcome 🚀
  • About Us ✨
  • Blog 🤓
  • Newsletter 🎉
  • Conferences 🎤
Top