 
  
    
    
    
Privilege Escalation
- 
    Breaking in before the VPN broke down - A Journey through Precious (HTB Writeup)Posted on 9 mins A full walkthrough of the Hack The Box machine “Precious” — from enumeration to exploitation, including a clever pdfkit command injection and Ruby YAML deserialization for root. With shell stabilisation and some VPN drama on the side.  
- 
    HTB Reset: From Log Poisoning to Root. Exploiting Tmux, Rexec and Misconfigured SudoPosted on 9 mins A deep-dive into escalating from LFI to full root via log poisoning, named pipe reverse shell, misconfigured sudo permissions, and forgotten tmux sessions. Includes analysis of R-services (rexec, rlogin, rsh) and real-world command chaining.  
- 
    What I Do After the User Flag — My Beginner’s Priv Esc FlowPosted on 4 mins Getting user.txt is just the beginning. Here’s how I hunt for privilege escalation paths on Linux boxes — what I check, how I think, and why it still stumps me sometimes.