Book

Privilege Escalation Techniques

Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester, because it helps penetration testers set up persistence and facilitates lateral movement. This book is a one-of-a-kind resource that covers both the theoretical foundations and a range of privilege escalation techniques and tools for both Windows and Linux systems.

Offered byPackt Logo

Difficulty Level

Intermediate

Completion Time

11h20m

Language

English

About Book

Who Is This Book For?

If you’re a pentester or a cybersecurity student interested in learning how to perform various privilege escalation techniques on Windows and Linux systems – including exploiting bugs and design flaws – then this book is for you. You’ll need a solid grasp on how Windows and Linux systems work along with fundamental cybersecurity knowledge before you get started.

Book content

chapters 11h20m total length

Introduction to Privilege Escalation

Setting Up Our Lab

Gaining Access (Exploitation)

Performing Local Enumeration

Windows Kernel Exploits

Impersonation Attacks

Windows Password Mining

Exploiting Services

Privilege Escalation through the Windows Registry

Linux Kernel Exploits

Linux Password Mining

Scheduled Tasks

Exploiting SUID Binaries

Related Resources

Access Ready-to-Use Books for Free!

Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!

No credit card required