• Complain

Alexis Ahmed - Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems

Here you can read online Alexis Ahmed - Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Packt Publishing, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Alexis Ahmed Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems
  • Book:
    Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2021
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Learn how to escalate your privileges on Windows and Linux systemsThis book is a comprehensive guide on the privilege escalation process for Windows and Linux systems and is designed to be practical and hands-on by providing the reader with real world exercises and scenarios in the form of vulnerable environments and virtual machines.Key Features
  • Learn how to perform local enumeration on Windows & Linux systems.
  • Understand the key differences between elevating privileges on Windows and Linux systems.
  • Learn how to identify privilege escalation vectors on Windows & Linux systems.
  • Learn how to elevate your privileges on Windows and Linux systems by leveraging various tools and techniques.
Privilege escalation is a vital element of the attack life cycle and is a major determinant in the overall success of a penetration test. The importance of privilege escalation in the penetration testing process cannot be overstated or overlooked. Developing your privilege escalation skills will mark you out as a good penetration tester. The ability to enumerate information from a target system and utilize this information to identify potential misconfigurations and vulnerabilities that can be exploited to elevate privileges is an essential skill set for any penetration tester.The book uses virtual environments that you can download to test and run tools and techniques. Each chapter will feature an exploitation challenge in the form of pre-built virtual machines (VMs). As you progress, you will learn how to enumerate and exploit vulnerabilities on Linux or Windows systems in order to elevate your privileges.By the end of this book, you will have gained the skills you need to be able to perform local enumeration in order to identify privilege escalation vectors on Windows and Linux systems and how to exploit them in order to elevate your privileges.What you will learn
  • Understand the privilege escalation process and how it differs from Windows to Linux
  • Learn how to set up a virtual penetration testing lab
  • Gain an initial foothold on the system
  • Perform local enumeration on target systems
  • Exploit kernel vulnerabilities on Windows and Linux systems
  • Perform privilege escalation through password looting and finding stored credentials
  • Get to grips with performing impersonation attacks
  • Exploit Windows services such as the secondary logon handle service to escalate Windows privileges
  • Escalate Linux privileges by exploiting scheduled tasks and SUID binaries
Who this book is for?This Windows and Linux privilege escalation book is for intermediate-level cybersecurity students and pentesters who are interested in learning how to perform various privilege escalation techniques on Windows and Linux systems, which includes exploiting bugs, design flaws, and more. An intermediate-level understanding of Windows and Linux systems along with fundamental cybersecurity knowledge is expected.Table of Contents
  1. Introduction to Privilege Escalation
  2. Setting Up Our Lab
  3. Gaining Access (Exploitation)
  4. Performing Local Enumeration
  5. Windows Kernel Exploits
  6. Impersonation Attacks
  7. Windows Password Mining
  8. Exploiting Services
  9. Privilege Escalation through the Windows Registry
  10. Linux Kernel Exploits
  11. Linux Password Mining
  12. Scheduled Tasks
  13. Exploiting SUID Binaries

Alexis Ahmed: author's other books


Who wrote Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems? Find out the surname, the name of the author of the book and a list of all author's works by series.

Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Privilege Escalation Techniques Learn the art of exploiting Windows and Linux - photo 1
Privilege Escalation Techniques

Learn the art of exploiting Windows and Linux systems

Alexis Ahmed

BIRMINGHAMMUMBAI Privilege Escalation Techniques Copyright 2021 Packt - photo 2

BIRMINGHAMMUMBAI

Privilege Escalation Techniques

Copyright 2021 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Group Product Manager: Vijin Boricha

Publishing Product Manager: Vijin Boricha

Senior Editor: Shazeen Iqbal

Content Development Editor: Romy Dias

Technical Editor: Shruthi Shetty

Copy Editor: Safis Editing

Project Coordinator: Shagun Saini

Proofreader: Safis Editing

Indexer: Manju Arasan

Production Designer: Prashant Ghare

First published: October 2021

Production reference: 1061021

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham

B3 2PB, UK.

ISBN 978-1-80107-887-0

www.packt.com

In loving memory of my late grandfather.

Contributors
About the author

Alexis Ahmed is an experienced penetration tester and security researcher with over 7 years of experience in the cybersecurity industry. He started off his career as a Linux system administrator and soon discovered a passion and aptitude for security and transitioned into a junior penetration tester. In 2017, he founded HackerSploit, a cybersecurity consultancy that specializes in penetration testing and security training, where he currently works as a senior penetration tester and trainer.

Alexis has multiple cybersecurity certifications, ranging from the CEH and Sec+ to OSCP, and is a certified ISO 27001 associate. He is also an experienced DevSecOps engineer and helps companies secure their Docker infrastructure.

I would like to thank my family for giving me the space and support I've needed to write this book, even while the COVID-19 global pandemic was raging around us. I would like to thank the entire Packt editing team, which has helped, guided, and encouraged me during this process, and I'd like to give special thanks to Romy Dias, who edited most of my work, and Andy Portillo, who helped me with the technical aspects of the book.

About the reviewer

Andy Portillo (n3t1nv4d3) holds an MS in information assurance and cybersecurity. He holds several certifications ranging from Offensive Security's OSCP and OSWP to Pentester Academy's CRTE and CARTP, ISC CISSP, SANS GWAPT, and GEVA, and ISACA's CISA and CDPSE. Andy has 8 years of experience in a wide range of information security disciplines and has industry experience in finance, payment cards, and academia. His career started as a network engineer before gaining extensive information security experience through roles including IS analyst and penetration tester, and he is currently working as a manager in a SecOps (vapt) team and lecturer at the University of Southern California. Above all the previously stated, he is a father, husband, and hacker!

To my wife and kids, thank you for your understanding and patience with me as I continue down my ever-growing learning paths and venture into a multitude of information security areas working, teaching, studying, and now reviewing books.

Table of Contents
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems»

Look at similar books to Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems»

Discussion, reviews of the book Privilege Escalation Techniques: Learn the art of exploiting Windows and Linux systems and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.