Author: Amit Ghodekar, Global Head Cyber Security, Cover-More Group
Privilege escalation is one of the most crucial steps performed by an attacker after gaining access to a system. A hacker can issue several actions from a breached unprivileged system, but they are limited due to many imposed restrictions. Thus, in order to gain more maneuvering capabilities, a hacker intends to provide permissions and escalate privileges of a system, user, or application. The current manuscript attempts to describe different types and methods such as DLL hijacking, Dylib hijacking, Spectre, Meltdown, etc., widely used by the hackers to escalate privileges along with their mitigation strategies.