O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Privilege Escalation

In this chapter, we will cover:

  • Using impersonation tokens
  • Local privilege escalation attack
  • Mastering the Social-Engineer Toolkit (SET)
  • Collecting victims' data
  • Cleaning up the tracks
  • Creating a persistent backdoor
  • Man-in-the-middle attack (MITM)

Introduction

Once we have gained access to the computer that we would like to attack, it's important that we escalate our privileges as much as possible. Generally, we gain access to a user account that has low privileges (the computer user). However, our target account may be the administrator account. In this chapter, we will explore various ways to escalate your privileges.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required