WSL privilege escalation

WSL | Windows Privilege Escalation

Table of ContentsIntroductionEnumerating WSL on a Target Windows MachineManual Enumeration MethodAutomated Enumeration with winPEASInteracting with WSLObtaining a Reverse Shell Inside the WSL InstanceNo Shell No Problem –...

Continue reading

SSH PENTEST

Pentesting SSH

Table of ContentsIntroductionEnumerating WSL on a Target Windows MachineManual Enumeration MethodAutomated Enumeration with winPEASInteracting with WSLObtaining a Reverse Shell Inside the WSL InstanceNo Shell No Problem –...

Continue reading

Pentesting FTP

Pentesting FTP

Table of ContentsIntroductionEnumerating WSL on a Target Windows MachineManual Enumeration MethodAutomated Enumeration with winPEASInteracting with WSLObtaining a Reverse Shell Inside the WSL InstanceNo Shell No Problem –...

Continue reading

Pentest Echo Port 7

Pentesting Echo | Port 7

Table of ContentsIntroductionEnumerating WSL on a Target Windows MachineManual Enumeration MethodAutomated Enumeration with winPEASInteracting with WSLObtaining a Reverse Shell Inside the WSL InstanceNo Shell No Problem –...

Continue reading

Pentest GDBServer

Pentesting Remote GdbServer

Table of ContentsIntroductionEnumerating WSL on a Target Windows MachineManual Enumeration MethodAutomated Enumeration with winPEASInteracting with WSLObtaining a Reverse Shell Inside the WSL InstanceNo Shell No Problem –...

Continue reading

Pentest VoIP

Pentest VOIP

Table of ContentsIntroductionEnumerating WSL on a Target Windows MachineManual Enumeration MethodAutomated Enumeration with winPEASInteracting with WSLObtaining a Reverse Shell Inside the WSL InstanceNo Shell No Problem –...

Continue reading

Sap

Pentesting SAP

Table of ContentsIntroductionEnumerating WSL on a Target Windows MachineManual Enumeration MethodAutomated Enumeration with winPEASInteracting with WSLObtaining a Reverse Shell Inside the WSL InstanceNo Shell No Problem –...

Continue reading

JDWP

Pentesting Java Debug Wire Protocol | JDWP

Table of ContentsIntroductionEnumerating WSL on a Target Windows MachineManual Enumeration MethodAutomated Enumeration with winPEASInteracting with WSLObtaining a Reverse Shell Inside the WSL InstanceNo Shell No Problem –...

Continue reading