Summary
In this chapter, we started by learning about the enumeration process. We then looked at how to perform local enumeration manually and automatically on Windows. Finally, we learned how to perform local enumeration on Linux.
Now that we have learned how to perform local enumeration on Windows and Linux, we can begin the privilege escalation process.
In the next chapter, we will begin the privilege escalation process on Windows by using kernel exploits.