Course contentsShow
Security
Lesson 2133 of 3,05242. Penetration Testing and Red TeamingPro lesson

Registry and File System Permission Weaknesses

Identifying and exploiting weak ACLs on registry keys, files, and folders that allow modification of privileged binaries or configurations.

This lesson is for subscribers

You've completed the free preview. Subscribe to unlock every lesson in every course.