Chapter 5: Windows Kernel Exploits
Now that we have learned how to enumerate important information from our target system and have identified potential privilege escalation attack vectors, we can begin the privilege escalation process on Windows. The first privilege escalation attack vector we will be exploring is kernel exploitation.
In this chapter, you will learn how to identify, transfer, and utilize kernel exploits on Windows both manually and automatically.
You will learn how a kernel works and how you can leverage kernel vulnerabilities to elevate your privileges on the target system. This is a vital part of the privilege escalation process as kernel vulnerabilities provide a straightforward way of elevating your privileges on a target system.
In this chapter, we're going to cover the following main topics:
- Understanding kernel exploits
- Kernel exploitation with Metasploit
- Manual kernel exploitation