PHASE: Escalation Techniques50% COMPLETION
Abort Mission
MODULE 08

Privilege Escalation Detection

Identifying Token Manipulation, UAC bypass, and "GetSystem" attempts.

Escalation Techniques

Privilege escalation allows attackers to gain higher-level permissions.

UAC Bypass: Using fodhelper.exe or eventvwr.exe
Token Impersonation: SeImpersonatePrivilege abuse