Book Content
chapters • 11h20m total length
1. Introduction to Privilege Escalation
2. Setting Up Our Lab
3. Gaining Access (Exploitation)
4. Performing Local Enumeration
5. Windows Kernel Exploits
6. Impersonation Attacks
7. Windows Password Mining
8. Exploiting Services
9. Privilege Escalation through the Windows Registry
10. Linux Kernel Exploits
11. Linux Password Mining
12. Scheduled Tasks
13. Exploiting SUID Binaries














