Chapter 8: Exploiting Services
Now that you have a good grasp of the common privilege escalation attack vectors on Windows, we can take a deeper look at Windows services and begin exploring the privilege escalation techniques that leverage vulnerabilities and misconfigurations in services in order to elevate our privileges on the target system. The objective of this chapter is to identify and exploit vulnerabilities and misconfigurations in common Windows services.
We will explore the process of identifying and exploiting unquoted service paths and weak service permissions, and we will then take a look at how to exploit the Windows secondary logon in order to elevate our privileges. We will also take an in-depth look at the process of identifying ...
Get Privilege Escalation Techniques now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.