Objective 3.5   Given a scenario, exploit local host vulnerabilities

Host-based vulnerabilities exist in host-based software or in the underlying operating system itself. When these vulnerabilities are exploited, they can lead to remote access, privilege escalation, unauthorized data access, and more. These can be taken advantage of individually to achieve some level of access, but frequently they are used together.

Windows Host-Based Vulnerabilities

Windows host-based vulnerabilities may focus on credential and privilege abuse, OS vulnerabilities and kernel exploits, default/insecure configurations, and service or application abuse. The typical ...

Get CompTIA PenTest+ Certification Passport (Exam PT0-001) now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.