Summary

In this chapter, we've learned the different ways to execute privilege escalation and exploit the vulnerabilities. We started with exporting a file to EXE and then moved to target a vulnerable software. After this, we initiated backdoor creation and subsequently covered our tracks to avoid detection.

In the next chapter, we'll deal with different types of encryption algorithms.

Get Python for Offensive PenTest now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.