April 2017
Intermediate to advanced
512 pages
7h 59m
English
In this chapter, we will cover the following recipes:
In the previous chapter, we looked at how one can exploit into the service and gain access to the server as a user with either a low or system privilege. In this chapter, we will look at how to exploit a low-privilege user to an escalated user - even the system user in this case. We will be covering escalation techniques for both Windows and Linux in this chapter. Usually in a network, when a server is ...
Read now
Unlock full access