Varma_ChekuriWindows Privilege Escalation-2This blog discusses on how to enumerate Windows systems manually and with tools13 min read·May 30, 2022----
Varma_ChekuriWindows Privilege EscalationThis blog discusses on how to enumerate Windows systems manually and with tools5 min read·May 17, 2022----
Varma_ChekuriPrivilege Escalation in Linux -3This blog discusses the basic escalation techniques required to get elevated shells in your bug-bounty or CTF challenges, and also to get a…4 min read·May 7, 2022----
Varma_ChekuriPrivilege Escalation in Linux-2This blog discusses the basic escalation techniques required to get elevated shells in your bug-bounty or CTF challenges, and also to get a…7 min read·May 3, 2022--2--2
Varma_ChekuriLinux Privilege Escalation part-1This blog discusses the basic escalation techniques required to get elevated shells in your bug-bounty or CTF challenges, and also to get a…5 min read·Apr 24, 2022----
Varma_ChekuriIntroduction To Azure Pentesting.Initially, we will be discussing the basics of how Azure assigns roles and how azure works.?4 min read·Mar 22, 2022--1--1
Varma_ChekuriA basic overview on PivotingPivoting is a method used to obtain access of an internal network in a Network pentest, in order to obtain privilege to access the deeper…7 min read·Feb 26, 2022----
Varma_ChekuriLinux Fundamentals Part-3To learn about Linux Fundamentals Part-2, click here.8 min read·Jan 24, 2022----