What is Privilege Escalation?

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10
Video Transcription
00:00
hello and welcome to another application of the minor attack framework discussion today. We're going to be looking at what is privilege escalation? Well, privilege escalation is consistent, or it consists of methods in which a threat actor is able to gain a higher level of permission
00:20
set on a system or network. So this allows Attackers to do more than just
00:25
explore the network and its in points on commonly they take advantage of system weaknesses, miss configurations on vulnerabilities. And so way to think of this
00:36
is that let's say I get into your, ah standard user account and I cant install anything. I can't really get into a lot of directories and things of that nature because your account just doesn't have the permission sets to do that. So by getting into your account
00:51
Onda looking at the system for weaknesses or miss configurations, or maybe they're Softwares that have vulnerabilities in them.
00:58
I can then use privilege escalation techniques to potentially get out of your account and maybe run a system or get your permission sets higher than what they should be. So some of the things that were going to be looking at within the privilege escalation phase of the minor attack framework
01:18
is access token manipulation.
01:19
We're going to look at elevated execution with prompt exploitation for put privilege escalation file system permission Weakness is scheduled. Task pseudo and Web SHELL Now
01:32
do keep in mind that within the minor attack framework, maybe you were reading it or looking through different areas, you might notice that some of these things tend to repeat themselves in other areas. And that's because some of these spectres are not just a one and done deal. So
01:48
you may see something about scheduled tasks in more than one section and things of that nature.
01:53
That's because they can be used for multiple vectors or in different phases of the minor attack framework. So with that in mind, I want to thank you for your time today and I look forward to seeing you again. Sim
Up Next
Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By