19
Nov

What Is Privilege Escalation and How Does it Work?

Author: Amit Ghodekar, Global Head Cyber Security, Cover-More Group

Privilege escalation is one of the most crucial steps performed by an attacker after gaining access to a system. A hacker can issue several actions from a breached unprivileged system, but they are limited due to many imposed restrictions. Thus, in order to gain more maneuvering capabilities, a hacker intends to provide permissions and escalate privileges of a system, user, or application. The current manuscript attempts to describe different types and methods such as DLL hijacking, Dylib hijacking, Spectre, Meltdown, etc., widely used by the hackers to escalate privileges along with their mitigation strategies.

get certified from ec-council
Write for Us
eccouncil track