The scenario serves as a guide on how to:
Understand Microsoft Windows privilege escalation techniques.
Understand how attackers can carry out privilege escalation techniques to escalate their privileges and fully compromise the target system.
OBJECTIVES AND OUTCOME
After completing this scenario you will be able to:
– Identify and execute local exploits using Metasploit.
– Use Metasploit post-exploitation module with obtained sessions.
In order to get the full benefit from this scenario, it is recommended that you have competencies in the following areas:
– Basic Linux and Windows command line knowledge
– Basic understanding of networking
– Familiarity with Metasploit
It is suggested that you consult with these recommended reading resources and pre-existing scenarios:
This scenario was created by Timothy Wambua