Skip to Content
Malware Development for Ethical Hackers
book

Malware Development for Ethical Hackers

by Zhassulan Zhussupov
June 2024
Beginner
402 pages
8h 34m
English
Packt Publishing
Content preview from Malware Development for Ethical Hackers

4

Mastering Privilege Escalation on Compromised Systems

Often, a malware’s initial compromise may not give it the level of access it needs to fully execute its malicious intent. This is where privilege escalation comes in. In this chapter, readers will learn about common privilege escalation methods used in Windows operating systems. From access token manipulation to dynamic-link library (DLL) search order hijacking and bypassing User Account Control (UAC), multiple techniques and methods are explored. Not only will the reader understand the mechanisms behind these methods, but they will also be able to see their practical applications in real-world scenarios. Through engaging examples and detailed explanations, this chapter provides an interesting ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Evasive Malware

Evasive Malware

Kyle Cucci
The Complete Ethical Hacking Course

The Complete Ethical Hacking Course

Codestars By Rob Percival, Atil Samancioglu
Practical Malware Analysis

Practical Malware Analysis

Michael Sikorski, Andrew Honig

Publisher Resources

ISBN: 9781801810173Supplemental Content