June 2024
Beginner
402 pages
8h 34m
English
Often, a malware’s initial compromise may not give it the level of access it needs to fully execute its malicious intent. This is where privilege escalation comes in. In this chapter, readers will learn about common privilege escalation methods used in Windows operating systems. From access token manipulation to dynamic-link library (DLL) search order hijacking and bypassing User Account Control (UAC), multiple techniques and methods are explored. Not only will the reader understand the mechanisms behind these methods, but they will also be able to see their practical applications in real-world scenarios. Through engaging examples and detailed explanations, this chapter provides an interesting ...