bars
Pentest Notes
search
circle-xmark
โ
Ctrl
k
copy
Copy
chevron-down
๐
Road to certification
chevron-right
CPTS
chevron-right
Notes
chevron-right
Windows Privilege Escalation
4.Attacking the OS
14.User-account-control
chevron-right
15.Weak-permissions
chevron-right
16.Kernel-exploits
chevron-right
17.Vulnerable-services
chevron-right
18.DLL-injection
chevron-right
Previous
Exploiting Event Log Readers Group for Security Log Access
chevron-left
Next
14.User-account-control
chevron-right
Last updated
8 months ago