Explore multiple methods to hijack, or use insecure configurations, to gain unauthorized privileges.
Certified Ethical Hacker - CEHv10: Privilege Escalation
- use DLL hijacking and file/folder permission exploitation to gain higher privileges
- use scheduled tasks and insecure sudo implementations to gain higher privileges
- use operating system vulnerabilities, webshells, and other techniques to gain unauthorized privileges
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.