Local Host Vulnerabilities
- OS Vulnerabilities
- Unsecure Service and Protocol Configurations
- Privilege Escalation
- Linux-Specific
- Windows-Specific
- Cpassword
- Clear Text Credentials in LDAP
- Kerberoasting
- Credentials in LSASS
- Unattended Installation
- SAM Database
- DLL Hijacking
- Exploitable Services
- Unsecure File/Folder Permissions
- Keylogger
- Scheduled Tasks
- Kernel Exploits
- Default Account Settings
- Sandbox Escape
- Physical Device Security