From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Privilege escalation overview

Privilege escalation overview

From the course: Ethical Hacking: System Hacking

Start my 1-month free trial

Privilege escalation overview

- One common misconception is that if someone obtains a password and can get into a system, they can execute applications, release malware, or install a root kit. Let's look at the reality. Commonly, the ethical hacker first obtains access to a system by acquiring a username and password of a less defended account. Now, this will allow access into a system, but that level of access will not have the privileges of an administrator. Any advanced system hacking will require the rights of the administrator, and gaining administrative access generally requires more work. Privilege escalation can be thought of in one of two ways: horizontal or vertical. In horizontal privilege escalation, the ethical hacker will take over the rights and privileges of a user who has the same rights and privileges. In vertical privilege escalation, the ethical hacker will gain access to an account and then elevate the privilege to a higher level. Privilege Escalation is accomplished by taking advantage of a…

Contents