O'Reilly logo

Learning Metasploit Exploitation and Development by Aditya Balapure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Post Exploitation – Privilege Escalation

In the previous chapter we went through the post-exploitation techniques. Post exploitation is divided into five different phases. This chapter will give a deep understanding of the first phase of post exploitation, which is Privilege Escalation. We will be covering new techniques and tricks on how to escalate our privileges once we have gained access to the system.

Understanding Privilege Escalation

Privilege Escalation in simple terms is gaining elevated privileges to resources that are normally protected and whose access is denied to normal or unauthorized users. Through escalated privileges, a malicious user may perform unauthorized actions and cause harm to the computer or the whole network. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required