Chapter 2
Post Exploitation
Section 1
Post Exploitation on Windows
Suppose, after exploiting a target successfully we have got a low-privilege session on the Windows machine. And when we try to escalate the privilege using standard methods, it fails. With this video discuss such situations and look for methods to escalate privilege using other vulnerabilities existing in the target machine. - Gain a meterpreter session after exploiting the target - Find other local exploits for the target - Use the exploit to escalate privilege