Downloading Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems PDF

Learn how to escalate your privileges on Windows and Linux systems
This book is a comprehensive guide on the privilege escalation process for Windows and Linux systems and is designed to be practical and hands-on by providing the reader with real world exercises and scenarios in the form of vulnerable environments and virtual machines.
Key Features
- Learn how to perform local enumeration on Windows & Linux systems.
- Understand the key differences between elevating privileges on Windows and Linux systems.
- Learn how to identify privilege escalation vectors on Windows & Linux systems.
- Learn how to elevate your privileges on Windows and Linux systems by leveraging various tools and techniques.
- Understand the privilege escalation process and how it differs from Windows to Linux
- Learn how to set up a virtual penetration testing lab
- Gain an initial foothold on the system
- Perform local enumeration on target systems
- Exploit kernel vulnerabilities on Windows and Linux systems
- Perform privilege escalation through password looting and finding stored credentials
- Get to grips with performing impersonation attacks
- Exploit Windows services such as the secondary logon handle service to escalate Windows privileges
- Escalate Linux privileges by exploiting scheduled tasks and SUID binaries
- Introduction to Privilege Escalation
- Setting Up Our Lab
- Gaining Access (Exploitation)
- Performing Local Enumeration
- Windows Kernel Exploits
- Impersonation Attacks
- Windows Password Mining
- Exploiting Services
- Privilege Escalation through the Windows Registry
- Linux Kernel Exploits
- Linux Password Mining
- Scheduled Tasks
- Exploiting SUID Binaries