Summary
In this chapter, we got started with understanding how to identify and exploit unquoted service paths and how they can be utilized to execute a malicious binary in order to elevate our privileges. We also explored the process of exploiting the Windows secondary logon both manually and automatically with the Metasploit framework. We then took a look at how to identify and exploit weak service permissions and ended the chapter by taking an in-depth look at how to identify missing DLLs and the process of performing DLL hijacking.
In the next chapter, we will explore the process of privilege escalation through the Windows Registry.