Skip to content

ActivePwns

Learn ethical hacking

  • POSTS
  • Pentesting Methodology
    • Active Directory
    • Windows PrivEsc
    • Linux PrivEsc
  • whoami

Tag: #linux

Weak File Permissions – Linux PrivEsc

July 12, 2023July 12, 2023 by abhinavdsubedi@gmail.com

Weak File Permissions In Linux, file permissions are used to control who can access files and directories and what level

Continue reading…Weak File Permissions – Linux PrivEsc

Port Forwarding – Linux

May 26, 2023 by abhinavdsubedi@gmail.com

Port forwarding is a networking technique that involves redirecting traffic from one network location to another. In the context of

Continue reading…Port Forwarding – Linux

Cron Jobs – Linux PrivEsc

April 28, 2023May 8, 2023 by abhinavdsubedi@gmail.com

Created with DALL-E What you’ll learn What are Cronjobs Cronjobs are a way to schedule tasks to be executed automatically

Continue reading…Cron Jobs – Linux PrivEsc

A Guide to Tunneling: Access Restricted Networks

April 11, 2023April 25, 2023 by abhinavdsubedi@gmail.com

Note: The explanation for most of the commands are written in the “Extras” section Tunneling is a technique used to

Continue reading…A Guide to Tunneling: Access Restricted Networks

Portable NMAP for Windows

April 10, 2023April 10, 2023 by abhinavdsubedi@gmail.com

Suppose you have gained access to a Windows machine through hacking and discovered that it is connected to an internal

Continue reading…Portable NMAP for Windows

How to build a Hacking lab at Home

April 5, 2023April 25, 2023 by abhinavdsubedi@gmail.com

As we rely more and more on technology, it’s become crucial to know how to detect and prevent vulnerabilities. This

Continue reading…How to build a Hacking lab at Home

Copyright © 2025 ActivePwns | Bold Photography by Catch Themes
Cleantalk Pixel Scroll Up Scroll Up