Explore multiple methods to hijack, or use insecure configurations, to gain unauthorized privileges.
Certified Ethical Hacker - CEHv10: Privilege Escalation
- use DLL hijacking and file/folder permission exploitation to gain higher privileges
- use scheduled tasks and insecure sudo implementations to gain higher privileges
- use operating system vulnerabilities, webshells, and other techniques to gain unauthorized privileges