Premise
In this video, I outlined the process of enumerating Windows and Linux for privilege escalation attacks. The techniques used are manual and recommended when automated scans or enumeration fails to find you a point of privilege escalation.
Skills Learned
- Windows privilege escalation
- Linux privilege escalation
Video Walk-through
Show Comments