In this chapter, you have learned how to gain access to a system using known exploits and how to move laterally between machines using stolen credentials. You have learned about the leaked exploits from the NSA and how they are used and about the havoc some of these have caused on the internet today.
In the next chapter, you will learn how to elevate your privileges from a normal user account to SYSTEM level access when you only have normal user rights.