🔏
RootGuard
Ctrlk
HomeSOC OperationsIncident ResponseWindows ForensicsLinux ForensicsKQL Investigations
  • Welcome
    • RootGuard
  • Resources Hub
    • Blogs
  • Learning Hub
    • Introduction
    • Essential Skills
    • Junior Analyst Skills
    • Intermediate and Advanced Skills
    • Vulnerability Management
    • Malware Analysis
  • Defensive Security
    • Incident Response
    • Windows Forensics
    • Linux Forensics
    • KQL for Defender & Sentinel
    • Memory Forensics
    • Playbooks
  • Detection Engineering
    • AD Attack Detections & Mitigations
    • Attack Triage Playbooks (KQL Triage)
    • Process Execution (KQL Triage)
    • Threat Hunting
  • Offensive Security
    • Penetration Testing
    • Pre-Engagement
    • Information Gathering
      • Network Enumeration with Nmap
      • Password Attacks
      • Active Directory Enumeration & Attacks
      • Attacking Common Services
      • Linux Privilege Escalation
      • Attacking Common Applications
      • Windows Privilege Escalation
      • Attacking Enterprise Networks
    • Vulnerability Assessment
    • Exploitation
    • Post-Exploitation
    • Lateral Movement
    • Proof-of-Concept
    • Post-Engagement
    • Practice
    • Pentesting Cheatsheet
Powered by GitBook
On this page
Edit
  1. Offensive Security
  2. Information Gathering

Attacking Common Applications

PreviousLinux Privilege EscalationNextWindows Privilege Escalation