Introduction
This is privilege escalation, as described on Wikipedia, privilege escalation is the act of exploiting a bug, design flaw, or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user. This results in unauthorized access to resources. Two types of privilege escalation are possible:
- Horizontal: This occurs in conditions where we are able to execute commands or functions that were not originally intended for the user access we currently have
- Vertical: This kind of exploitation occurs when we are able to escalate our privileges to a higher user level, for example, getting root on the system
In this chapter, you will learn the different ways of escalating our privileges on Linux and Windows systems as well as gaining access to the internal network.