Penetration Test - Select Your Attacks(16)

Miscellaneous privilege escalation

EXPLOITABLE SERVICES
  • Unquoted service paths
    • Allow abbreviated attack paths(without spaces)

image-20201101174358162

image-20201101174539228

PRIVILEGE ESCALATION
  • Unsecure file/folder permissions - root installs allow read/write by any user
  • Keylogger
    • Records every keystroke
  • Scheduled tasks
    • Attacker may add new task to run persistently with elevated privileges
  • Kernel exploits
    • Unpatched systems are vulnerable
QUICK REVIEW
  • Unquoted service paths and writable services can allow for service exploits.
  • Look for files and folders that allow excessive read/write permissions
  • Footprinting can provide information on kernel vulnerabilities
posted @ 2020-11-01 17:53  晨风_Eric  阅读(37)  评论(0编辑  收藏  举报