PHASE: Escalation Techniques50% COMPLETION
MODULE 08
Privilege Escalation Detection
Identifying Token Manipulation, UAC bypass, and "GetSystem" attempts.
Escalation Techniques
Privilege escalation allows attackers to gain higher-level permissions.
UAC Bypass: Using fodhelper.exe or eventvwr.exe
Token Impersonation: SeImpersonatePrivilege abuse