O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Privilege Escalation and Exploitation

In this chapter, we will cover the following recipes:

  • Using WMIC to find privilege-escalation vulnerabilities
  • Sensitive-information gathering
  • Unquoted service-path exploitation
  • Service permissions issues
  • Misconfigured software installations/insecure file permissions
  • Linux privilege escalation

Introduction

In the previous chapter, we looked at how one can exploit into the service and gain access to the server as a user with either a low or system privilege. In this chapter, we will look at how to exploit a low-privilege user to an escalated user - even the system user in this case. We will be covering escalation techniques for both Windows and Linux in this chapter. Usually in a network, when a server is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required