官术网_书友最值得收藏!

Vertical privilege escalation

Vertical privilege escalation is where the attacker has to grant the higher privileges to himself/herself. It is a complex procedure since the user has to perform some kernel-level operations to elevate their access rights.

Once the operations are done, the attacker is left with access rights and privileges that allows them to run any unauthorized code. The rights acquired using this method are those of a super user that has higher rights than an administrator.

Due to these privileges, an attacker can perform various harmful actions that not even an administrator can stop. In Windows, vertical escalation is used to cause buffer overflows that attackers use to execute arbitrary code. This type of privilege escalation has already been witnessed in an attack that happened in May 2017 called WannaCry. WannaCry, a ransomware, caused devastation by encrypting computers in over 150 countries in the world and demanding a ransom of $300 to decrypt that would double after the second week. The interesting thing about it is that it was using a vulnerability called EternalBlue allegedly stolen from the NSA.

EternalBlue allowed the malware to escalate its privileges and run any arbitrary code on Windows computers.

In Linux, vertical privilege escalation is used to allow attackers to run or modify programs on a target machine with root user privileges.

主站蜘蛛池模板: 平利县| 策勒县| 彭州市| 隆安县| 界首市| 岚皋县| 定州市| 五寨县| 宁阳县| 吴川市| 鄂尔多斯市| 额敏县| 泰安市| 新化县| 屏东县| 焉耆| 广安市| 石景山区| 阳朔县| 旺苍县| 镇远县| 东乡族自治县| 台州市| 调兵山市| 阳东县| 赣州市| 黔江区| 琼海市| 上蔡县| 长汀县| 临江市| 牡丹江市| 巴东县| 宁晋县| 镇巴县| 长丰县| 兴海县| 上思县| 葵青区| 永丰县| 景谷|