Gaining access to a system is only the first step in executing application, releasing malware, or installing a rootkit. In this video, Lisa Bock defines privilege escalation, or elevating the rights of a user to gain broader access to a system. Understand the difference between horizontal and vertical privilege escalation.
- One common misconception is that…if someone obtains a password and can get…into a system, they can execute applications,…release malware, or install a root kit.…Let's look at the reality.…Commonly, the ethical hacker first obtains access…to a system by acquiring a username and password…of a less defended account.…Now, this will allow access into a system,…but that level of access will not have the privileges…of an administrator.…
Any advanced system hacking will require the rights…of the administrator, and gaining administrative access…generally requires more work.…Privilege escalation can be thought of…in one of two ways: horizontal or vertical.…In horizontal privilege escalation,…the ethical hacker will take over the rights…and privileges of a user who has the same…rights and privileges.…In vertical privilege escalation,…the ethical hacker will gain access…to an account and then elevate the privilege…to a higher level.…
Privilege Escalation is accomplished…by taking advantage of a vulnerability…in an application or an operating system.…
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks
Skill Level Intermediate
1. System Hacking Overview
2. Gaining Access
3. Privilege Escalation
6. Hiding in Plain Sight
7. Cover Your Tracks
How to cover your tracks2m 34s
Next steps1m 2s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.