From the course: Complete Guide to Enterprise Cyber Defense

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Understanding Windows attacks

Understanding Windows attacks

- [Instructor] One of the most common Windows attacks is a Privilege Escalation Technique. This is a situation where an attacker has already gained access to the system, but they have limited access rights. So they need to escalate their privileges to become a more powerful user such as system. Let's take a look at an example. Here we have a Meterpreter shell running on WEB01 in the context of IIS POOL\SiteA user. This means there's an exploit running on WEB01, which we are in control of. We can interact with this by going -i interact with the session, shell, and we have full shell access to that server. But as we mentioned, we're running in the context of a limited IIS APPPOOL user, in this case, sitea. We do whoami /all. We can see we have limited permissions here, so the attacker needs to escalate the permissions to become a more dangerous user. By default, IIS APPPOOL application users have this…

Contents