Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems

Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege’s of the compromised user. Regular users on systems usually have very limited privileges and can not access many of the resources or make changes to their systems and resources (databases, etc.). This is one of the many ways […]

Continue Reading

Open Source Intelligence (OSINT): OSINT Tools for Bitcoin Investigations

Welcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency scam and theft investigations and recovery. As the price of these cryptocurrencies has soared, so has the incidence of scams and thefts. A reputable source has estimated the value of bitcoin and crypto-currency thefts and […]

Continue Reading