官术网_书友最值得收藏!

Access and privilege escalation

This phase comes after an attacker has already identified a target, and scanned and exploited its vulnerabilities using the previously discussed tools and scanning tools. The main focus of the attacker in this phase is to maintain access and move around in the network while remaining undetected. In order to achieve this freedom of movement without being detected, an attacker needs to perform privilege escalation. This is an attack that will grant the attacker an elevated level of access to a network, its connected systems, and devices.

Privilege escalation can be done in two ways: vertical, and horizontal:

Table 1: A comparison of horizontal and vertical privilege escalation
主站蜘蛛池模板: 香港| 楚雄市| 和田市| 灵璧县| 顺平县| 夏河县| 东辽县| 五莲县| 菏泽市| 灵山县| 中宁县| 化州市| 定远县| 灵武市| 中卫市| 米林县| 大冶市| 二连浩特市| 凤城市| 湘西| 肃宁县| 庆安县| 肃宁县| 东乌珠穆沁旗| 富源县| 绥德县| 民丰县| 安康市| 剑阁县| 龙门县| 金坛市| 定结县| 长葛市| 无极县| 温泉县| 隆安县| 香港| 屯留县| 滨海县| 阳信县| 兖州市|