Chapter 5: Windows Kernel Exploits

Now that we have learned how to enumerate important information from our target system and have identified potential privilege escalation attack vectors, we can begin the privilege escalation process on Windows. The first privilege escalation attack vector we will be exploring is kernel exploitation.

In this chapter, you will learn how to identify, transfer, and utilize kernel exploits on Windows both manually and automatically.

You will learn how a kernel works and how you can leverage kernel vulnerabilities to elevate your privileges on the target system. This is a vital part of the privilege escalation process as kernel vulnerabilities provide a straightforward way of elevating your privileges on a target ...

Get Privilege Escalation Techniques now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.