- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 171字
- 2021-06-30 19:15:56
Horizontal privilege escalation
Horizontal privilege escalation, on the other hand, is simpler since it allows a user to use the same privileges gained from the initial access.
A good example is where an attacker has been able to steal the login credentials of an administrator of a network. The administrator account already has high privileges that the attacker assumes immediately after accessing it.
Horizontal privilege also occurs when an attacker is able to access protected resources using a normal user account. A good example is where a normal user is erroneously able to access the account of another user. This is normally done through session and cookie theft, cross-site scripting, guessing weak passwords, and logging keystrokes.
At the end of this phase, the attacker normally has well-established remote access entry points into a target system. The attacker might also have access to the accounts of several users. The attacker also knows how to avoid detection from security tools that the target might have. This leads to the next phase, called exfiltration.
- 嵌入式Linux開發技術
- Mobile-first Bootstrap
- Linux實戰
- Kubernetes網絡權威指南:基礎、原理與實踐
- 高性能Linux服務器構建實戰:運維監控、性能調優與集群應用
- Microsoft Operations Management Suite Cookbook
- 巧學活用Windows 7
- Linux內核觀測技術BPF
- VMware NSX Cookbook
- AWS Development Essentials
- Application Development in iOS 7
- CentOS 6 Linux Server Cookbook
- Learning Continuous Integration with Jenkins(Second Edition)
- 應急指揮信息系統設計
- OpenStack Essentials(Second Edition)