- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 112字
- 2021-06-30 19:15:56
Access and privilege escalation
This phase comes after an attacker has already identified a target, and scanned and exploited its vulnerabilities using the previously discussed tools and scanning tools. The main focus of the attacker in this phase is to maintain access and move around in the network while remaining undetected. In order to achieve this freedom of movement without being detected, an attacker needs to perform privilege escalation. This is an attack that will grant the attacker an elevated level of access to a network, its connected systems, and devices.
Privilege escalation can be done in two ways: vertical, and horizontal:

Table 1: A comparison of horizontal and vertical privilege escalation
推薦閱讀
- Installing and Configuring Windows 10:70-698 Exam Guide
- 嵌入式操作系統(tǒng)(Linux篇)(微課版)
- Linux就該這么學(xué)
- 深入淺出Node.js
- Linux設(shè)備驅(qū)動(dòng)開發(fā)
- Django Project Blueprints
- Hands-On UX Design for Developers
- RHCSARHCE 紅帽Linux認(rèn)證學(xué)習(xí)指南(第7版)EX200 & EX300
- 跟老男孩學(xué)Linux運(yùn)維:Shell編程實(shí)戰(zhàn)
- bash shell腳本編程經(jīng)典實(shí)例(第2版)
- Zabbix監(jiān)控系統(tǒng)之深度解析和實(shí)踐
- Azure Resource Manager Templates Quick Start Guide
- 每天5分鐘玩轉(zhuǎn)Docker容器技術(shù)
- BuddyPress Theme Development
- 電腦辦公(Windows 7 + Office 2013)入門與提高