Pentest Notes
Search...
Ctrl
K
🎓
Road to certification
CPTS
Windows Privilege Escalation
4.Attacking the OS
14.User-account-control
15.Weak-permissions
16.Kernel-exploits
17.Vulnerable-services
18.DLL-injection
Previous
Exploiting Event Log Readers Group for Security Log Access
Next
14.User-account-control
Last updated
12 days ago