Session

Breaking Boundaries: Practical Privilege Escalation in Modern Systems

Privilege escalation is often the defining moment in a real-world compromise-turning a simple foothold into complete system or domain control. This workshop dives deep into the practical aspects of local privilege escalation on both Linux and Windows systems, with a strong focus on post-exploitation techniques that work in the field.
We’ll start by understanding how attackers enumerate and fingerprint systems to uncover weak spots: misconfigured SUDO rules, SUID binaries, insecure services, unquoted paths, token privileges, and more. Participants will learn how to move from basic user to root or SYSTEM using real attack paths-without relying on outdated exploits.
The Linux section will cover classic and modern techniques such as exploiting cron jobs, abusing environment variables, leveraging GTFOBins, and privilege escalation via poorly configured permissions. In the Windows segment, we’ll walk through hands-on abuse of misconfigured registry keys, privilege tokens, DLL hijacking, and escalating through service misconfigurations.
Alongside tools like LinPEAS, WinPEAS, PowerUp, and custom scripts, you’ll get to practice techniques in live demo labs that simulate real environments.
This is not a passive session-expect to get your hands dirty, think like an attacker, and walk away with an arsenal of techniques you can apply in your next engagement or red team operation.

Abhijeet Singh

Security Researcher | Trainer | Red Teamer | Offensive Tradecraft

New Delhi, India

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top