In this chapter, we will cover the following topics:
- Establishing a connection as an elevated user
- Remotely bypassing Windows UAC
- Local Linux system check for privilege escalation
- Local Linux privilege escalation
- Remote Linux privilege escalation
- DirtyCOW privilege escalation for Linux