Persistence, Privilege Escalation, and Evasion

In this chapter, you will learn how to

•  Use built-in operating system tools to further compromise environments

•  Implement techniques for gaining persistence on your targets

•  Leverage Windows privilege escalation techniques

•  Identify ways of evading antivirus



In Chapter 4 you learned how pentesters can gain access to target devices by exploiting weaknesses in systems. As you’ll read in this chapter, once testers have gone through the trouble of gaining initial access via exploitation, they’ll want to make sure they do not lose that access. Regardless of whether you gain access to an endpoint device via phishing or to a server in a DMZ via command injection, for example, you ...

Get GPEN GIAC Certified Penetration Tester All-in-One Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.