Privilege Escalation (TA0004)

DDoSPedia An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

Security Research Center

Not every exploit results in complete and unrestricted access to a victim’s network or host. Threat actors will often find themselves confined inside a container, virtual machine or host with limited rights and will need to escalate their privileges to move longitudinally inside the host or laterally across the network.

Gaining more access can be performed by vertical privilege escalation through, for example, vulnerabilities, access token manipulation, bypassing user account controls or DDL injection and search order hijacking on Windows. On Linux, vertical privilege escalation can be performed through, for example, kernel and sudo exploits. Horizontal privilege escalation for lateral movement can be performed, for example, by taking over another account, abusing privileges granted to other users or by modification of domain policies.

 

DDoSPedia Index

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Radware Blog
Security Research Center