Everything that starts with a methodology offers an approach to a problem solution. In this section, we will go through the common escalation methodology utilized by attackers during a red teaming exercise, or penetration testing. The following diagram depicts the methodology that can be used:

In line with the kill-chain methodology, the action of the objective includes escalation of privilege to maintain persistence to the target environment.
The following are the types of user accounts that are found in any target system:
- Normal user: Typical access through a backdoor runs at the level of the user who executes the backdoor. These are the normal users of the system (Windows or Unix) and are either local users or domain users with limited access on the system to perform only tasks that are allowed for them.
- Local administrator: Local administrators are system account holders that have the privilege to run system configuration changes.
- Delegated administrator...