官术网_书友最值得收藏!

Access and privilege escalation

This phase comes after an attacker has already identified a target, and scanned and exploited its vulnerabilities using the previously discussed tools and scanning tools. The main focus of the attacker in this phase is to maintain access and move around in the network while remaining undetected. In order to achieve this freedom of movement without being detected, an attacker needs to perform privilege escalation. This is an attack that will grant the attacker an elevated level of access to a network, its connected systems, and devices.

Privilege escalation can be done in two ways: vertical, and horizontal:

Table 1: A comparison of horizontal and vertical privilege escalation
主站蜘蛛池模板: 弥勒县| 平顶山市| 昭觉县| 宣威市| 大庆市| 临夏市| 昌邑市| 海口市| 台中县| 松江区| 微山县| 乡城县| 台东县| 嫩江县| 卢氏县| 会昌县| 拉孜县| 榆林市| 城市| 屏东市| 荃湾区| 唐海县| 南华县| 禹州市| 高安市| 三河市| 南涧| 伽师县| 皮山县| 景洪市| 漳州市| 西青区| 黔江区| 鄄城县| 洛川县| 天峨县| 青冈县| 犍为县| 东平县| 宣汉县| 吴堡县|