官术网_书友最值得收藏!

Vertical privilege escalation

Vertical privilege escalation is where the attacker has to grant the higher privileges to himself/herself. It is a complex procedure since the user has to perform some kernel-level operations to elevate their access rights.

Once the operations are done, the attacker is left with access rights and privileges that allows them to run any unauthorized code. The rights acquired using this method are those of a super user that has higher rights than an administrator.

Due to these privileges, an attacker can perform various harmful actions that not even an administrator can stop. In Windows, vertical escalation is used to cause buffer overflows that attackers use to execute arbitrary code. This type of privilege escalation has already been witnessed in an attack that happened in May 2017 called WannaCry. WannaCry, a ransomware, caused devastation by encrypting computers in over 150 countries in the world and demanding a ransom of $300 to decrypt that would double after the second week. The interesting thing about it is that it was using a vulnerability called EternalBlue allegedly stolen from the NSA.

EternalBlue allowed the malware to escalate its privileges and run any arbitrary code on Windows computers.

In Linux, vertical privilege escalation is used to allow attackers to run or modify programs on a target machine with root user privileges.

主站蜘蛛池模板: 安新县| 昌黎县| 安徽省| 三明市| 彝良县| 衡山县| 嫩江县| 陵川县| 平武县| 曲沃县| 招远市| 苍南县| 乌审旗| 陇南市| 淮滨县| 清水河县| 丰顺县| 历史| 寿光市| 遂平县| 龙门县| 五河县| 新化县| 和林格尔县| 瑞昌市| 丹棱县| 会东县| 白朗县| 绥江县| 松潘县| 林周县| 水城县| 广东省| 长汀县| 社会| 丁青县| 通城县| 临安市| 延吉市| 岳普湖县| 大埔县|