{"componentChunkName":"component---src-templates-post-template-js","path":"/internal-note-en","result":{"data":{"markdownRemark":{"id":"5e3ba78c-aedb-5359-9b2b-9c65a0ed4556","html":"<blockquote>\n<p>This page has been machine-translated from the <a href=\"/internal-note\">original page</a>.</p>\n</blockquote>\n<p>This article is visible to authenticated users only due to security concerns.</p>\n<h3 id=\"index\" style=\"position:relative;\"><a href=\"#index\" aria-label=\"index permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Index</h3>\n<ul>\n<li><a href=\"#attack-technique\">Attack Technique</a></li>\n<li><a href=\"#malware\">Malware</a></li>\n<li><a href=\"#reversing\">Reversing</a></li>\n<li><a href=\"#environments\">Environments</a></li>\n<li><a href=\"#web-application-exploits\">WEB Application Exploits</a></li>\n<li><a href=\"#windows-privilege-escalation\">Windows Privilege Escalation</a></li>\n<li><a href=\"#linux-privilege-escalation\">Linux Privilege Escalation</a></li>\n<li><a href=\"#database-privilege-escalation\">Database Privilege Escalation</a></li>\n<li><a href=\"#internal-writeup\">Internal writeup</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/HEVD/Note/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">HEVD Note</a></li>\n</ul>\n<h3 id=\"cheat-sheet\" style=\"position:relative;\"><a href=\"#cheat-sheet\" aria-label=\"cheat sheet permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cheat Sheet</h3>\n<ul>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/CheatSheet/CheatSheet-CTF.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CTF Cheat Sheet</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/CheatSheet/CheatSheet-Pwn.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Pwn Cheat Sheet</a></li>\n<li><a href=\"/windbg-basics-001-en\">WinDbg Cheat Sheet</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/Malware/Notes/MalwareAnalysis_Cheetsheet.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Malware Analysis Cheat Sheet</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/Malware/Notes/MalwareDevelop.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Malware Development Techniques</a></li>\n<li><a href=\"/ghidra-ghidrascript-tutorial-en\">Ghidra Script Cheat Sheet</a></li>\n<li><a href=\"/ctf-angr-tutorial-en\">angr Cheat Sheet</a></li>\n</ul>\n<h3 id=\"reversing\" style=\"position:relative;\"><a href=\"#reversing\" aria-label=\"reversing permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Reversing</h3>\n<ul>\n<li><a href=\"/windbg-basics-001-en\">WinDbg Cheat Sheet</a></li>\n<li><a href=\"/ctf-pefile-tips\">Tips to Know Before Analyzing PE Files</a></li>\n<li><a href=\"/ctf-heroctf-windows-memory-analysis-en\">Analyzing Windows Memory with Volatility3 and Identifying Command History from a WSL bash Process</a></li>\n<li><a href=\"/binja-python-api-en\">Binary Ninja Python API Cheat Sheet</a></li>\n<li><a href=\"/ghidra-ghidrascript-tutorial-en\">Ghidra Script Cheat Sheet</a></li>\n<li><a href=\"/ctf-angr-tutorial-en\">angr Cheat Sheet</a></li>\n<li><a href=\"/unicorn-binary-deobfuscation-en\">Self-Restoring Binary Deobfuscation with Unicorn and Capstone</a></li>\n<li><a href=\"/windbg-gflags-tutorial-en\">Notes on GFlags Settings Useful for Troubleshooting Windows Environments</a></li>\n<li><a href=\"/ctf-learning-aes-en\">Learning AES Implementation and Decrypting Ciphertext with a Custom SBox</a></li>\n<li><a href=\"/ctf-android-apk-debug-tutorial-en\">5 Techniques I Learned to Not Lose on Android App Analysis Problems</a></li>\n<li><a href=\"/ctf-wmctf-2023-en\">Android Native Library Function Analysis and RC4 / AES Decryption 【WMCTF 2023】</a></li>\n</ul>\n<h3 id=\"pwn\" style=\"position:relative;\"><a href=\"#pwn\" aria-label=\"pwn permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Pwn</h3>\n<ul>\n<li><a href=\"/ctf-sec4b-kernel-exploit-en\">Getting Started with Linux Kernel Exploitation via sec4b-2023’s driver4b</a></li>\n<li><a href=\"/ctf-learning-heap-en\">A Beginner CTFer’s Notes on Understanding Heap Completely</a></li>\n<li><a href=\"/ctf-pwn-og-en\">A Beginner CTFer’s Pwn Crash Course 1 - FSB Basics and ROP Techniques</a></li>\n<li><a href=\"/ctf-pwn-gachi-rop-en\">A Beginner CTFer’s Pwn Crash Course 2 - seccomp Bypass and Shell Code Basics</a></li>\n</ul>\n<h3 id=\"environments\" style=\"position:relative;\"><a href=\"#environments\" aria-label=\"environments permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Environments</h3>\n<ul>\n<li><a href=\"/ctf-setup-windows-lab-en\">Setting Up a CTF Environment on Windows</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/tree/pre-public/internal-content/Environments\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Environment Setup Guides (Internal)</a></li>\n</ul>\n<h3 id=\"attack-technique\" style=\"position:relative;\"><a href=\"#attack-technique\" aria-label=\"attack technique permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Attack Technique</h3>\n<ul>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/CheatSheet/CheatSheet-CTF.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CTF Cheat Sheet</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/CheatSheet/CheatSheet-Machine.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Machine Hacking Cheat Sheet</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/CheatSheet/CheetSheet-AD-Attack.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Privilege Escalation in Active Directory Environments</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Windows-Exploits/Windows-Useful-Exploits.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Exploits Useful for Attacking Windows Environments</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Linux-Exploits/Linux-Useful-LocalPriv-Exploit.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Commonly Used Linux Local Privilege Escalation Exploits</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Web-Exploits/Web-Useful-Exploit.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Web Application Exploit Tips</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/CheatSheet/CheetSheet-Metasproit.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Metasploit Tips</a></li>\n</ul>\n<h3 id=\"malware\" style=\"position:relative;\"><a href=\"#malware\" aria-label=\"malware permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Malware</h3>\n<ul>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/Malware/Notes/MalwareAnalysis_Cheetsheet.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Malware Analysis Cheat Sheet</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/Malware/Notes/MalwareDevelop.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Malware Implementation</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/tree/pre-public/Malware/Techniques\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Common Techniques Used by Malware</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/Malware/Report-2023\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Malware Analysis Report List (2023)</a></li>\n</ul>\n<h3 id=\"web-application-exploits\" style=\"position:relative;\"><a href=\"#web-application-exploits\" aria-label=\"web application exploits permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>WEB Application Exploits</h3>\n<ul>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Web-Exploits/Web-Useful-Exploit.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Web Application Exploit Tips</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Linux-Exploits/Linux-ShellShock.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Overview and Exploitation of Shell Shock</a></li>\n</ul>\n<h3 id=\"windows-privilege-escalation\" style=\"position:relative;\"><a href=\"#windows-privilege-escalation\" aria-label=\"windows privilege escalation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Windows Privilege Escalation</h3>\n<ul>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Windows-Exploits/Windows-Useful-Exploits.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Exploits Useful for Attacking Windows Environments</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Windows-Exploits/Windows-Priviledges-Knowledge.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Knowledge on Windows Privileges That Can Be Abused for Attacks</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Windows-Exploits/Windows-XP-replace-service-binary.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Gaining SYSTEM Privileges by Tampering with Service Configurations on Windows XP SP2 and Earlier</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Windows-Exploits/Windows-Office-ClientSide-Attack.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Verification of Client-Side Attacks against Windows Endpoints</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Windows-Exploits/Windows-Potato-and-Printspooler.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Privilege Escalation Techniques Using Potato and PrintSpoofer</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Windows-Exploits/Windows-Primary-Access-Token-Manipulation.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Privilege Escalation Techniques via Primary Access Token Manipulation</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Windows-Exploits/Windows-NamedPipeInpersonation.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Windows Privilege Escalation via Named Pipe Impersonation</a></li>\n</ul>\n<h3 id=\"linux-privilege-escalation\" style=\"position:relative;\"><a href=\"#linux-privilege-escalation\" aria-label=\"linux privilege escalation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Linux Privilege Escalation</h3>\n<ul>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Linux-Exploits/Linux-Useful-LocalPriv-Exploit.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Commonly Used Linux Local Privilege Escalation Exploits</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Linux-Exploits/Linux-Kernel-Local-Priv-Escalation-CVE-2017-16995.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Linux Kernel &#x3C; 4.13.9 (Ubuntu 16.04 / Fedora 27) - Local Privilege Escalation (CVE-2017-16995)</a></li>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Linux-Exploits/Linux-SUID-Baron-Samedit-Heap-Exploit.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit)</a></li>\n</ul>\n<h3 id=\"database-privilege-escalation\" style=\"position:relative;\"><a href=\"#database-privilege-escalation\" aria-label=\"database privilege escalation permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Database Privilege Escalation</h3>\n<ul>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/blob/pre-public/internal-content/Exploits/DB-MySQL-User-Defined-Local-Priv-Escalation.md\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">MySQL User-Defined (Linux) x32 / x86<em>64 - ‘sys</em>exec’ Local Privilege Escalation (2)</a></li>\n</ul>\n<h3 id=\"internal-writeup\" style=\"position:relative;\"><a href=\"#internal-writeup\" aria-label=\"internal writeup permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Internal writeup</h3>\n<ul>\n<li><a href=\"https://github.com/kash1064/Kaeru-no-Himitsukichi/tree/pre-public/internal-content/OSCP\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">OSCP</a></li>\n</ul>","fields":{"slug":"/internal-note-en","tagSlugs":["/tag/english/"]},"frontmatter":{"date":"2000-1-1","description":null,"tags":["English"],"title":"Knowledge Base (Internal Note)","socialImage":{"publicURL":"/static/dc4d8b7f8795f3c3d3489d9957d155f2/no-image.png"}}}},"pageContext":{"slug":"/internal-note-en"}},"staticQueryHashes":["251939775","401334301","825871152"]}