Review All Key Topics
Review the most important topics in this chapter, noted with the Key Topics icon in the outer margin of the page. Table 7-3 lists these key topics and the page number on which each is found.
Table 7-3 Key Topics for Chapter 7
Key Topic Element |
Description |
Page Number |
Summary |
Understanding insecure service and protocol configurations |
281 |
Summary |
Understanding local privilege escalation |
285 |
Summary |
Understanding Linux permissions |
286 |
Summary |
Changing Linux permissions and understanding sticky bits |
288 |
Summary |
Understanding SUID or SGID and Unix programs |
291 |
Summary |
Identifying insecure Sudo implementations |
294 |
Summary |
Understanding ret2libc attacks |
298 |
Summary |
Defining CPassword |
299 |
Summary |
Abusing and obtaining clear-text LDAP credentials |
300 |
Summary |
Understanding Kerberoasting |
301 |
Summary |
Compromising credentials in Local Security Authority Subsystem Service (LSASS) implementations |
301 |
Summary |
Understanding and attacking the Windows SAM database |
302 |
Summary |
Understanding dynamic link library (DLL) hijacking |
303 |
Summary |
Abusing exploitable services |
304 |
Summary |
Exploiting insecure file and folder permissions |
305 |
Summary |
Defining and understanding keyloggers |
306 |
Summary |
Defining and understanding scheduled tasks |
307 |
Summary |
Understanding sandbox escape attacks |
308 |
Summary |
Understanding virtual machine (VM) escape attacks |
310 |
Summary |
Identifying container security challenges |
313 |
Summary |
Understanding the top mobile security threats and vulnerabilities |
314 |
Summary |
Understanding Android security |
316 |
Summary |
Understanding Apple iOS security |
323 |
Summary |
Understanding cold boot attacks, serial console, and JTAG debugging reconnaissance and tampering |
326 |
Summary |
Understanding physical security attacks |
327 |