Explore multiple methods to hijack, or use insecure configurations, to gain unauthorized privileges.
Certified Ethical Hacker - CEHv10: Privilege Escalation