Mastering Privilege Escalation on Compromised Systems
Often, a malware’s initial compromise may not give it the level of access it needs to fully execute its malicious intent. This is where privilege escalation comes in. In this chapter, readers will learn about common privilege escalation methods used in Windows operating systems. From access token manipulation to dynamic-link library (DLL) search order hijacking and bypassing User Account Control (UAC), multiple techniques and methods are explored. Not only will the reader understand the mechanisms behind these methods, but they will also be able to see their practical applications in real-world scenarios. Through engaging examples and detailed explanations, this chapter provides an interesting guide to elevating privileges on compromised systems in the malware development landscape.
In this chapter, we’re going to cover the following main topics:
- Manipulating access tokens
- Password stealing
- Leveraging...