Privilege Escalation Techniques
By :
Privilege Escalation Techniques
By:
Overview of this book
Privilege Escalation Techniques is a detailed guide to privilege escalation techniques and tools for both Windows and Linux systems. This is a one-of-a-kind resource that will deepen your understanding of both platforms and provide detailed, easy-to-follow instructions for your first foray into privilege escalation.
The book uses virtual environments that you can download to test and run tools and techniques. After a refresher on gaining access and surveying systems, each chapter will feature an exploitation challenge in the form of pre-built virtual machines (VMs). As you progress, you will learn how to enumerate and exploit a target Linux or Windows system. You’ll then get a demonstration on how you can escalate your privileges to the highest level.
By the end of this book, you will have gained all the knowledge and skills you need to be able to perform local kernel exploits, escalate privileges through vulnerabilities in services, maintain persistence, and enumerate information from the target such as passwords and password hashes.
Table of Contents (18 chapters)
Preface
Section 1: Gaining Access and Local Enumeration
Free Chapter
Chapter 1: Introduction to Privilege Escalation
Chapter 2: Setting Up Our Lab
Chapter 3: Gaining Access (Exploitation)
Chapter 4: Performing Local Enumeration
Section 2: Windows Privilege Escalation
Chapter 5: Windows Kernel Exploits
Chapter 6: Impersonation Attacks
Chapter 7: Windows Password Mining
Chapter 8: Exploiting Services
Chapter 9: Privilege Escalation through the Windows Registry
Section 3: Linux Privilege Escalation
Chapter 10: Linux Kernel Exploits
Chapter 11: Linux Password Mining
Chapter 12: Scheduled Tasks
Chapter 13: Exploiting SUID Binaries
Other Books You May Enjoy
Customer Reviews