AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: Alex, a professional hacker, gained eccouncil video

Question 1 Be Honest
« Back   Next ethical-hacker Question »
Answer

Full Certification Question

Alex, a professional hacker, gained unauthorized access to a Windows-based system. To escalate privileges, he abused an interface module in Windows that enables a software component to interact with another software component. He manipulated valid object references by replacing them with malicious content in Windows Registry. When the victim executes that object, the malicious code is automatically executed, allowing Alex to escalate privileges. Which of the following privilege escalation methods did Alex employ in the above scenario?