Section 2: Windows Privilege Escalation
This section will cover the privilege escalation process on Windows systems. You will be able to elevate privileges on the target system through the use of multiple privilege escalation attack vectors, techniques, and tools.
The following chapters are included in this section:
- Chapter 5, Windows Kernel Exploits
- Chapter 6, Impersonation Attacks
- Chapter 7, Windows Password Mining
- Chapter 8, Exploiting Services
- Chapter 9, Privilege Escalation through the Windows Registry