Section 1: Gaining Access and Local Enumeration
This section will give you an introduction to the privilege escalation process and will cover the process of gaining an initial foothold on the target system and how to perform local enumeration on target systems in order to identify potential vulnerabilities.
The following chapters are included in this section:
- Chapter 1, Introduction to Privilege Escalation
- Chapter 2, Setting Up Our Lab
- Chapter 3, Gaining Access (Exploitation)
- Chapter 4, Performing Local Enumeration