Escalating privileges
Once a machine is compromised, any access obtained is usually with low privileges. As the idea of any pen test is to simulate a real-world attack, this includes looking for sensitive information, which is normally kept on restricted servers; the tester would need to find ways to escalate their privileges. In a Windows Active Directory (AD) environment, this would mean getting access to a Domain Admin account.
推薦閱讀
- 白話網絡安全2:網安戰略篇
- 計算機網絡安全技術(第6版·慕課版)
- 工業互聯網安全
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 黑客攻防與無線安全從新手到高手(超值版)
- 數字化轉型浪潮下的數據安全最佳實踐指南
- 防火墻技術與應用(第2版)
- Testing and Securing Android Studio Applications
- 網絡安全技術與實訓(第4版)(微課版)
- CTF那些事兒
- 數據保護:工作負載的可恢復性
- Cybersecurity Threats,Malware Trends,and Strategies
- 網絡攻防實戰研究:MySQL數據庫安全
- 一本書讀透金融科技安全
- Instant OSSEC Host-based Intrusion Detection System