Local System Attacks
Abstract
This chapter looks at what actions to take once we have internal access to a target system during a professional penetration test. These attacks are often dependent on previous (remote) exploitations that allow us unauthorized access to the system; however, once inside, we may need to elevate our privileges so that we can further compromise the system and possibly the rest of the network.
Keywords
Shell
Backdoor
Encryption
Tunnels
Tunneling
Local attacks
Exploitation
Contents
Get Professional Penetration Testing, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.