File Transfer

Introduction File transfer is a core step after initial access because tools, logs, and evidence must move between the attacker and the target. Host controls like application allowlists, AV, and EDR often block common utilities, which means you need more than one method. Network controls such as firewalls and IPS can also restrict ports or flag unusual protocols, so flexibility is essential. A solid operator keeps multiple options ready and chooses the least noisy path that still works. ...

December 24, 2025 · 7 min · Miguel Lameiro (lameiro0x)

Linux privilege escalation

Introduction Linux privilege escalation starts with careful enumeration, then moves through environment weaknesses, permissions, services, and kernel internals. This guide blends theory with concrete commands you can reuse during post-exploitation. Enumeration First Enumeration gives you the attack surface and the likely paths to root. Focus on OS version, kernel version, running services, user context, sudo rights, and writable locations. System, Users, and Services Collect system and user context early, then expand to services and network state. These quick commands set the baseline and guide later steps. ...

December 24, 2025 · 7 min · Miguel Lameiro (lameiro0x)

Windows privilege escalation

Introduction Windows privilege escalation is about moving from a low-privilege shell to local admin or SYSTEM. It often succeeds because of weak permissions, misconfigured services, or excessive group rights. This guide merges theory and commands into a practical workflow. Workflow Overview A reliable escalation workflow starts with enumeration, then pivots into privilege and service abuse, and finally checks kernel or patch-based options. You should prioritize low-risk misconfigurations before running exploits. This keeps the engagement stable and reduces the chance of breaking the host. ...

December 24, 2025 · 7 min · Miguel Lameiro (lameiro0x)