- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 112字
- 2021-06-30 19:15:56
Access and privilege escalation
This phase comes after an attacker has already identified a target, and scanned and exploited its vulnerabilities using the previously discussed tools and scanning tools. The main focus of the attacker in this phase is to maintain access and move around in the network while remaining undetected. In order to achieve this freedom of movement without being detected, an attacker needs to perform privilege escalation. This is an attack that will grant the attacker an elevated level of access to a network, its connected systems, and devices.
Privilege escalation can be done in two ways: vertical, and horizontal:

Table 1: A comparison of horizontal and vertical privilege escalation
推薦閱讀
- Windows Vista基礎與應用精品教程
- Persistence in PHP with the Doctrine ORM
- VMware Horizon View 6 Desktop Virtualization Cookbook
- 嵌入式應用程序設計綜合教程(微課版)
- Ubuntu Linux操作系統
- 8051軟核處理器設計實戰
- Linux網絡配置與安全管理
- 鴻蒙操作系統設計原理與架構
- 從實踐中學習Windows滲透測試
- 統信UOS應用開發進階教程
- bash shell腳本編程經典實例(第2版)
- 大學計算機應用基礎實踐教程(Windows 7+MS Office 2010)
- Linux深度攻略
- Serverless Architectures with Kubernetes
- Windows Azure實戰