Chapter 16. Exploiting Windows Access Control Model for Local Elevation of Privilege
This chapter will teach you about Windows Access Control and how to find instances of misconfigured access control exploitable for local privilege escalation.
Why study access control?
How Windows Access Control works
Tools for analyzing access control configurations
Special SIDs, special access, and denied access
Analyzing access control for attacks
Attack patterns for each interesting object type
What other object types are out there?
Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.