TLDR
- exploit a pre-auth RCE vulnerability on a
SaltStack master

TL;DR
- Enumerate SNMP and find traces of
clamav-milter
- Exploit
sendmail
which is vulnerable to RCE

TL ; DR
- Use Nmap to get a list of service running on the target
- Enumerate SMB
- Exploit SMB to get RCE
- No P.E Required
TLDR
- Bypass Auth -> SSRF -> RCE
- Exploit misconfigured sudo privilege to root

TLDR
- Fuzz directory to find application which is vulnerable to SQLi
- Exploit the vulnerable application using SQLMap to get shell

TLDR
- Exploit
OpenSMTP
Vulnerability to get the RCE as root.

TLDR
- Use Nmap to get the list of services running on the target.
- On web app use default credentials to login.
- Exploit CMS which is vulnerable to authenticated RCE.
- Exploit Cronjob to escalate privilege to root.
TLDR
- Exploit the known vulnerability of the services running on the system
- You get the shell as root so no P.E required
TLDR
- Exploit Local file inclusion to get credentials from config
- Use the credentials to get into Mysql
- From MySQL get the login creds for
upload
page
- Bypass restriction and upload shell
- exploit misconfigured SUID for privilege escalation.