Escalate from low-privilege user to root or SYSTEM.
Privilege escalation involves exploiting misconfigurations, vulnerabilities, or weak permissions to elevate access from a limited user to a privileged one.
Linux PrivEsc
SUID, sudo misconfigs, cron jobs, capabilities, and kernel exploits.
Windows PrivEsc
Token impersonation, service exploits, registry, and AlwaysInstallElevated.