Abusing vulnerable software¶
Vulnerability in software
Available exploit
Example¶
Use the
wmic
tool to list software installed on the target system and its versions:Search for existing exploits on the installed software online on sites like exploit-db, packet storm or Google.
Exploit
Notes¶
Software installed on the target system can present various privilege escalation opportunities. As with drivers, organisations and users may not update them as often as they update the operating system.
Last update:
2025-05-12 14:16