O'Reilly logo

Professional Penetration Testing by Thomas Wilhelm

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 12. Compromising a System and Privilege Escalation

Introduction

Один волк гоняет овец полк. – Russian proverb:“One wolf can rout an entire flock.”
The Information System Security Assessment Framework (ISSAF) dedicates only one and a half pages to compromising a system and elevating privileges during a penetration test. It would be natural to assume because so little page space is dedicated to this phase of a PenTest, it might be unimportant or simple to perform – this could not be further from the truth. Once system vulnerability has been identified and exploited, the penetration tester typically has a small foothold into the system and only with minimal privileges. Although limited access may be enough to justify ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required