From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 24,200 courses taught by industry experts.

Obtaining administrator privileges

Obtaining administrator privileges

From the course: Ethical Hacking: System Hacking

Obtaining administrator privileges

- [Instructor] Once an ethical hacker gains access to a system, the next step is to obtain administrator privileges in order to execute applications. In this segment, we'll explore methods used to escalate a user's privileges to gain further access to the system. During pen testing, the ethical hacker will need administrator privileges to access resources that are normally restricted from an end user or application to do any real modification to the system. So let's talk about a few methods we can use. One method is to exploit User Access Control. User Access Control is a Windows operating system security feature that limits standard users' privileges and requires administrative approval for certain actions that could potentially impact system integrity. Now commonly, when installing a program, you'll see a notification like this one that will prompt you to approve the change to your system. Ethical hackers can use several techniques to bypass UAC and escalate privileges on a Windows…

Contents