What is Privilege Escalation?
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
8 hours 29 minutes
hello and welcome to another application of the minor attack framework discussion today. We're going to be looking at what is privilege escalation? Well, privilege escalation is consistent, or it consists of methods in which a threat actor is able to gain a higher level of permission
set on a system or network. So this allows Attackers to do more than just
explore the network and its in points on commonly they take advantage of system weaknesses, miss configurations on vulnerabilities. And so way to think of this
is that let's say I get into your, ah standard user account and I cant install anything. I can't really get into a lot of directories and things of that nature because your account just doesn't have the permission sets to do that. So by getting into your account
Onda looking at the system for weaknesses or miss configurations, or maybe they're Softwares that have vulnerabilities in them.
I can then use privilege escalation techniques to potentially get out of your account and maybe run a system or get your permission sets higher than what they should be. So some of the things that were going to be looking at within the privilege escalation phase of the minor attack framework
is access token manipulation.
We're going to look at elevated execution with prompt exploitation for put privilege escalation file system permission Weakness is scheduled. Task pseudo and Web SHELL Now
do keep in mind that within the minor attack framework, maybe you were reading it or looking through different areas, you might notice that some of these things tend to repeat themselves in other areas. And that's because some of these spectres are not just a one and done deal. So
you may see something about scheduled tasks in more than one section and things of that nature.
That's because they can be used for multiple vectors or in different phases of the minor attack framework. So with that in mind, I want to thank you for your time today and I look forward to seeing you again. Sim