- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 112字
- 2021-06-30 19:15:56
Access and privilege escalation
This phase comes after an attacker has already identified a target, and scanned and exploited its vulnerabilities using the previously discussed tools and scanning tools. The main focus of the attacker in this phase is to maintain access and move around in the network while remaining undetected. In order to achieve this freedom of movement without being detected, an attacker needs to perform privilege escalation. This is an attack that will grant the attacker an elevated level of access to a network, its connected systems, and devices.
Privilege escalation can be done in two ways: vertical, and horizontal:

Table 1: A comparison of horizontal and vertical privilege escalation
推薦閱讀
- Cybersecurity:Attack and Defense Strategies
- 構建高可用Linux服務器(第4版)
- 嵌入式Linux系統開發:基于Yocto Project
- PLC控制系統應用與維護
- Ubuntu Linux操作系統
- Windows Vista融會貫通
- Mobile First Design with HTML5 and CSS3
- 寫給架構師的Linux實踐:設計并實現基于Linux的IT解決方案
- 分布式高可用架構之道
- Drupal 7 Cookbook
- 鴻蒙HarmonyOS應用開發入門
- Mastering Azure Serverless Computing
- Website Development with PyroCMS
- Windows 8玩全不求人
- Responsive Web Design by Example:Beginner's Guide(Second Edition)