Privilege Escalation Techniques
Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester, because it helps penetration testers set up persistence and facilitates lateral movement. This book is a one-of-a-kind resource that covers both the theoretical foundations and a range of privilege escalation techniques and tools for both Windows and Linux systems.
Offered by
Difficulty Level
Intermediate
Completion Time
11h20m
Language
English
About Book
Who Is This Book For?
If you’re a pentester or a cybersecurity student interested in learning how to perform various privilege escalation techniques on Windows and Linux systems – including exploiting bugs and design flaws – then this book is for you. You’ll need a solid grasp on how Windows and Linux systems work along with fundamental cybersecurity knowledge before you get started.
Privilege Escalation Techniques
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 11h20m total length
Introduction to Privilege Escalation
Setting Up Our Lab
Gaining Access (Exploitation)
Performing Local Enumeration
Windows Kernel Exploits
Impersonation Attacks
Windows Password Mining
Exploiting Services
Privilege Escalation through the Windows Registry
Linux Kernel Exploits
Linux Password Mining
Scheduled Tasks
Exploiting SUID Binaries
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!