Chapter 7. Escalating Privileges
In this chapter, we will cover:
- Using impersonation tokens
- Local privilege escalation attack
- Mastering the Social Engineering Toolkit (SET)
- Collecting the victim's data
- Cleaning up the tracks
- Creating a persistent backdoor
- Man In The Middle (MITM) attack