Book

Privilege Escalation Techniques

Privilege escalation is a crucial step in the exploitation life cycle of a penetration tester, because it helps penetration testers set up persistence and facilitates lateral movement. This book is a one-of-a-kind resource that covers both the theoretical foundations and a range of privilege escalation techniques and tools for both Windows and Linux systems.

Offered byPackt Logo

Difficulty Level
Intermediate
Completion Time
11h20m approx.
Language
English
Certification
Not available

About Course

Book Content

chapters 11h20m total length

1. Introduction to Privilege Escalation
2. Setting Up Our Lab
3. Gaining Access (Exploitation)
4. Performing Local Enumeration
5. Windows Kernel Exploits
6. Impersonation Attacks
7. Windows Password Mining
8. Exploiting Services
9. Privilege Escalation through the Windows Registry
10. Linux Kernel Exploits
11. Linux Password Mining
12. Scheduled Tasks
13. Exploiting SUID Binaries

On this page

Ready to Train Your Team?

Need training for your whole team? Get bulk pricing, LMS integration, and dedicated support.

Trusted by Leading Organizations Worldwide

Join thousands of companies that trust Calibr to power their learning and development initiatives.

Chalet Hotels logo
Pernod Ricard logo
ProMobi logo
Metrique logo
K Raheja Corp logo
Spyne.AI logo
VuNet Systems logo
Procurement Partners logo
vEngage.AI logo
1218 Global logo
TRADEJINI logo
Oben Electric logo
IIT STartups logo
EdTech Digit logo
MindSkillz logo
NewportMed logo

Request Access For Your Organization

Start training your team in minutes!

No credit card required

Related Resources