In the last chapter, we learned about the various aspects of web application security. In this chapter, we are going to discuss various concepts related to privilege escalation. We will get familiar with various privilege-escalation concepts along with practical techniques of escalating privileges on compromised Windows and Linux systems.
We will cover the following topics in this chapter:
- Defining privilege escalation
- Horizontal versus vertical privilege escalation
- Privilege escalation on Windows
- Privilege escalation on Linux