Privilege escalation

After exploiting a vulnerability, most of the time, you will get a limited shell. The next step is to get an admin account on the victim machine. To accomplish this, you will need to choose one of the following methodologies:

  • Transfer a file to the victim machine to allow you to have a root shell (for example, Dirty COW)
  • Copy–pasting a PowerShell payload for Windows OS (for example, Empire PowerShell)
  • Using Metasploit/Meterpreter to escalate the privileges (refer to Appendix B)
  • Manually searching for misconfigured parameters in order to get an admin/root shell
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.204.208