Summary
In this chapter, we got started with identifying and running kernel exploits automatically with the Metasploit framework. We then looked at how to identify, compile, and transfer kernel exploits manually. We then ended the chapter with how to execute kernel exploits on the target system successfully in order to elevate our privileges on the target system.
Now that we have learned how to perform kernel exploitation on Windows, we can begin exploring other privilege escalation vectors.
In the next chapter, we will explore impersonation attacks on Windows and how they can lead to successful privilege escalation.