Infiltr8: The Red-Book
Ctrlk
Infiltr8ForumGitHub
  • The Red-Book
  • Red-Teaming
    • Reconnaissance
    • Execution
    • Initial Access
    • Persistence
    • Defense Evasion
    • Discovery
    • Privilege Escalation
      • Windows
      • Linux
        • Kernel Exploits
          • OverlayFs Exploits
          • CVE-2023-32233 (CAP_NET_ADMIN)
          • Dirty Pipe
          • ๐Ÿ› ๏ธDirtyCow
          • ๐Ÿ› ๏ธRDS
          • ๐Ÿ› ๏ธFull Nelson
          • ๐Ÿ› ๏ธMempodipper
        • GLIBC Exploits
        • Polkit Exploits
        • Sudo Exploits
        • SUID Binaries
        • Script Exploits
        • Scheduled tasks
        • Interesting Groups
        • Capabilities
        • NFS no_root_squash/no_all_squash
        • Linux Active Directory
    • Credential Access
    • Lateral Movement
    • Exfiltration
  • Web Pentesting
    • Reconnaissance
    • Infrastructures
    • Web Vulnerabilities
  • Network Pentesting
    • Network services
    • WiFi
    • Bluetooth
  • Active Directory Pentesting
    • Reconnaissance
    • Movement
    • Persistence
  • Smart Contracts Pentesting
    • ๐Ÿ› ๏ธOn-Chain Analysis
    • Smart Contract Vulnerabilities
  • ๐Ÿ› ๏ธCloud & CI/CD Pentesting
    • CI/CD
    • Azure Pentesting
    • GCP Pentesting
    • AWS Pentesting
Powered by GitBook
On this page
Edit
  1. Red-Teaming
  2. Privilege Escalation
  3. Linux

Kernel Exploits

OverlayFs ExploitsCVE-2023-32233 (CAP_NET_ADMIN)Dirty Pipe๐Ÿ› ๏ธDirtyCow๐Ÿ› ๏ธRDS๐Ÿ› ๏ธFull Nelson๐Ÿ› ๏ธMempodipper

Last updated 2 years ago

Was this helpful?

Was this helpful?