Skip to Content
Ethical Hacking
book

Ethical Hacking

by Daniel G. Graham
September 2021
Intermediate to advanced
376 pages
9h 25m
English
No Starch Press
Content preview from Ethical Hacking

14PIVOTING AND PRIVILEGE ESCALATION

What I cannot create, I do not understand.

–Richard Feynman

image

By this point in the book, we’ve explored many ways of compromising a single machine. But attackers often want full control of the entire private network they’re targeting. With full control of the network, the attacker can move freely from machine to machine, extracting information and implanting malware as they please. Moreover, once the attacker has control of the network, removing them can be very difficult because they could be hiding anywhere. In this chapter we’ll explore two techniques for moving through the network.

First, you’ll learn a pivoting ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Rafay Baloch
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition

Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost
Hands on Hacking

Hands on Hacking

Matthew Hickey, Jennifer Arcuri

Publisher Resources

ISBN: 9781098129095Errata Page