From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Obtaining administrator privileges
From the course: Ethical Hacking: System Hacking
Obtaining administrator privileges
- [Instructor] Once an ethical hacker gains access to a system, the next step is to obtain administrator privileges in order to execute applications. In this segment, we'll explore methods used to escalate a user's privileges to gain further access to the system. During pen testing, the ethical hacker will need administrator privileges to access resources that are normally restricted from an end user or application to do any real modification to the system. So let's talk about a few methods we can use. One method is to exploit User Access Control. User Access Control is a Windows operating system security feature that limits standard users' privileges and requires administrative approval for certain actions that could potentially impact system integrity. Now commonly, when installing a program, you'll see a notification like this one that will prompt you to approve the change to your system. Ethical hackers can use several techniques to bypass UAC and escalate privileges on a Windows…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.