In this chapter, we've learned the different ways to execute privilege escalation and exploit the vulnerabilities. We started with exporting a file to EXE and then moved to target a vulnerable software. After this, we initiated backdoor creation and subsequently covered our tracks to avoid detection.
In the next chapter, we'll deal with different types of encryption algorithms.