
Certified Ethical Hacker (CEH) v12 312-50 Exam Guide
By :

Wanting local administrative rights, even though you're not allowed them, is what escalating privileges is all about. So, the problem we have here is now we've gone through and hacked a password and figured out the user ID, we're stuck with the privilege of that user—or are we?
Kevin Mitnick, the world-famous hacker said the following:
It's true, I had hacked into a lot of companies and took copies of the source code to analyze it for security bugs. If I could locate security bugs, I could become better at hacking into their systems—it was all towards becoming a better hacker.
When you think about it, what he was doing was elevating his privileges by getting to know the source code and seeing which bugs or vulnerabilities he had to escalate out of.
What do we do now? Remember how we made it in this far? We found a user account and cracked their password. Our goal...
Change the font size
Change margin width
Change background colour