Darknet Diaries
149: Mini-Stories: Vol 3
Joe Sarkisian
So now we have domain access as that user. So typically what we'll do, we'll look for some basic, you know, privilege escalation opportunities. And at the same time, we're looking for data, right? So let's say we're kind of poking for both of those things, right? We want to prove that risk that this basic user maybe has access to some data that they don't need access to.
0
💬
0
Comments
Log in to comment.
There are no comments yet.