November 2025
Intermediate to advanced
568 pages
10h 32m
English
In this chapter, you will learn about a critical phase in penetration testing that focuses on transitioning from a compromised low-privilege account to full administrative or root-level control over a target system. This chapter provides a hands-on exploration of the techniques and vulnerabilities attackers exploit to elevate privileges in both Windows and Linux environments. Through a series of practical recipes, you’ll learn how to recognize exploitable misconfigurations, leverage vulnerable services and applications, and chain together multiple exploits to break through privilege boundaries.
The chapter begins by examining common privilege escalation vectors in Windows, such as application ...
Read now
Unlock full access