Escalate privileges

After penetration, if the established presence doesn’t have admin/root privileges, a top priority may become escalating privileges so that further action become possible. There are a variety of ways to escalate privileges through simple and allowed actions that are usually environment specific, depending on the OS, version and configuration of the target system and even on the applications and their configurations. There is also exploit code designed specifically to escalate privileges instead of penetration. Both Core-Impact and Canvas include this type of exploit code.

Leave a Reply

You must be logged in to post a comment.