Windows privilege escalation through network backdoor and information mining using USB Hacktool / Hidayat UI Hazazi Ab Wahab and Jasni Mohamad Zain

A privilege escalation in the Windows system can be defined as a method of gaining access to the kernel system and allowing the user to have an administrative access to the local admin account system on the computer. This paper describes the proof of concept attack scheme using Universal Serial Bus...

Full description

Saved in:
Bibliographic Details
Main Authors: Ab Wahab, Hidayat UI Hazazi (Author), Mohamad Zain, Jasni (Author)
Format: Book
Published: Universiti Teknologi MARA Press (Penerbit UiTM), 2018.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repouitm_43154
042 |a dc 
100 1 0 |a Ab Wahab, Hidayat UI Hazazi  |e author 
700 1 0 |a Mohamad Zain, Jasni  |e author 
245 0 0 |a Windows privilege escalation through network backdoor and information mining using USB Hacktool / Hidayat UI Hazazi Ab Wahab and Jasni Mohamad Zain 
260 |b Universiti Teknologi MARA Press (Penerbit UiTM),   |c 2018. 
500 |a https://ir.uitm.edu.my/id/eprint/43154/1/43154.pdf 
520 |a A privilege escalation in the Windows system can be defined as a method of gaining access to the kernel system and allowing the user to have an administrative access to the local admin account system on the computer. This paper describes the proof of concept attack scheme using Universal Serial Bus (USB) Hacktool. The attack scheme, the same interaction on the physical access to the computer system could be accomplished by the attacker using a little effort on social engineering and specialized USB Hacktool to take over the computer system in full where it will collect valuable information and escalate the administrative privilege to gain unauthorized admin access which further attack can be done like setting up an open port for backdoor access. The evaluation of this paper gives a significant value as for educational purpose for proof of concept security project. The implementation on this project could help the responsible team to take necessary action toward physical security access to their computer or workstation. 
546 |a en 
690 |a Factor analysis. Principal components analysis. Correspondence analysis 
690 |a Online data processing 
690 |a Web-based user interfaces. User interfaces (Computer systems) 
690 |a Web databases 
655 7 |a Article  |2 local 
655 7 |a PeerReviewed  |2 local 
787 0 |n https://ir.uitm.edu.my/id/eprint/43154/ 
787 0 |n https://mjoc.uitm.edu.my 
856 4 1 |u https://ir.uitm.edu.my/id/eprint/43154/  |z Link Metadata