Chapter 16. Exploiting Windows Access Control Model for Local Elevation of Privilege

This chapter will teach you about Windows Access Control and how to find instances of misconfigured access control exploitable for local privilege escalation.

  • Why study access control?

  • How Windows Access Control works

  • Tools for analyzing access control configurations

  • Special SIDs, special access, and denied access

  • Analyzing access control for attacks

  • Attack patterns for each interesting object type

  • What other object types are out there?

Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.