-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Kali Linux Cookbook - Third Edition
By :
In this chapter, you will learn about a critical phase in penetration testing that focuses on transitioning from a compromised low-privilege account to full administrative or root-level control over a target system. This chapter provides a hands-on exploration of the techniques and vulnerabilities attackers exploit to elevate privileges in both Windows and Linux environments. Through a series of practical recipes, you’ll learn how to recognize exploitable misconfigurations, leverage vulnerable services and applications, and chain together multiple exploits to break through privilege boundaries.
The chapter begins by examining common privilege escalation vectors in Windows, such as application flaws and weak service configurations, before moving on to multi-stage chaining attacks that reflect real-world red team scenarios. We then turn to Linux-based systems, demonstrating both direct root-level escalation and advanced chaining...