Objective 3.5 Given a scenario, exploit local host vulnerabilities
Host-based vulnerabilities exist in host-based software or in the underlying operating system itself. When these vulnerabilities are exploited, they can lead to remote access, privilege escalation, unauthorized data access, and more. These can be taken advantage of individually to achieve some level of access, but frequently they are used together.
Windows Host-Based Vulnerabilities
Windows host-based vulnerabilities may focus on credential and privilege abuse, OS vulnerabilities and kernel exploits, default/insecure configurations, and service or application abuse. The typical ...