This lesson is for subscribers
You've completed the free preview. Subscribe to unlock every lesson in every course.
Identifying and exploiting weak ACLs on registry keys, files, and folders that allow modification of privileged binaries or configurations.
You've completed the free preview. Subscribe to unlock every lesson in every course.