After exploiting a vulnerability, most of the time, you will get a limited shell. The next step is to get an admin account on the victim machine. To accomplish this, you will need to choose one of the following methodologies:
- Transfer a file to the victim machine to allow you to have a root shell (for example, Dirty COW)
- Copy–pasting a PowerShell payload for Windows OS (for example, Empire PowerShell)
- Using Metasploit/Meterpreter to escalate the privileges (refer to Appendix B)
- Manually searching for misconfigured parameters in order to get an admin/root shell