Expanded Library

Privilege Escalation with PEASS-NG

by Rishalin Pillay

Adversaries frequently use unprivileged access to enter and browse a network, but they need privileged access to complete their tasks. In this course, you will learn privilege escalation using the PEASS-NG suite.

What you'll learn

Manually looking for privilege escalation paths can become a timely activity. Sometimes you may miss misconfigurations that are easily exploitable and at times you may not be looking at all possibilities. In this course, Privilege Escalation with PEASS-NG, you’ll cover how to utilize WinPEAS and LinPEAS to execute privilege escalation in a red team environment. First, you’ll explore using LinPEAS to discover excessive permissions related to SETUID/SETGID. Next, you’ll apply WinPEAS to discover dll’s that can be exploited. Finally, you’ll simulate the task of finding valuable registry keys which enable you to install services with elevated permissions. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques [T1548.001, T1055.001, T1547.001] using the PEASS-NG suite. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.

Table of contents

Course Overview
1min
Privilege Escalation with LinPEAS
9mins
Privilege Escalation with WinPEAS
9mins
Resources
1min

About the author

Rishalin is an active author, who has authored a number of courses found on Pluralsight. In addition to video courses, he has authored two books titled "Learn Penetration Testing" and "Offensive Shellcode from Scratch". He serves as a technical contributor to many books ranging from Dark Web Analysis, Kali Linux, Offensive Security, SECOPS, and study guides across Networking and Microsoft technologies. He holds the Microsoft Content Publisher Gold and Platinum awards for his contributions made ... more

Ready to upskill? Get started