Threats & AttacksCritical
Privilege Escalation
A security attack where an attacker gains elevated access privileges beyond what they were originally granted, often to access sensitive data or perform unauthorized actions
Skill Paths:
Penetration TestingSecurity AnalysisIncident ResponseSystem Administration
Job Paths:
Penetration TesterSecurity AnalystIncident ResponderSystem Administrator
Relevant Certifications:
CEHOSCPCISSPCompTIA Security+
Content
What is Privilege Escalation?
Privilege escalation is a security attack where an attacker gains elevated access privileges beyond what they were originally granted. This can occur through exploiting vulnerabilities, misconfigurations, or using legitimate tools in unintended ways to access sensitive data or perform unauthorized actions.
Types of Privilege Escalation
Vertical Privilege Escalation
- Gaining higher privileges – Moving from user to administrator access
- Root/administrator access – Obtaining highest system privileges
- Domain admin access – Gaining domain controller privileges
- Service account compromise – Exploiting service account privileges
Horizontal Privilege Escalation
- Accessing other user accounts – Moving between users at same privilege level
- Session hijacking – Taking over another user's session
- Token manipulation – Modifying access tokens
- Credential theft – Stealing other users' credentials
Common Privilege Escalation Techniques
Exploitation Methods
- Buffer overflows – Exploiting memory vulnerabilities
- Race conditions – Timing-based privilege escalation
- DLL hijacking – Replacing legitimate DLLs with malicious ones
- Service exploitation – Exploiting vulnerable system services
- Kernel exploits – Exploiting operating system kernel vulnerabilities
Misconfiguration Exploitation
- Weak file permissions – Exploiting overly permissive file access
- Service misconfigurations – Exploiting incorrectly configured services
- Registry vulnerabilities – Exploiting Windows registry misconfigurations
- Scheduled task abuse – Using scheduled tasks for privilege escalation
- Environment variable manipulation – Exploiting PATH or other environment variables
Social Engineering
- Credential harvesting – Stealing administrator credentials
- Phishing attacks – Tricking users into revealing credentials
- Shoulder surfing – Observing password entry
- Insider assistance – Compromising authorized personnel
Detection and Prevention
Technical Controls
- Access monitoring – Monitor for unusual privilege usage
- Privilege auditing – Regular review of user privileges
- Least privilege principle – Grant minimal necessary permissions
- Multi-factor authentication – Additional verification for privileged access
- Session monitoring – Track user sessions and activities
System Hardening
- Regular patching – Keep systems updated
- Security configuration – Implement secure default settings
- Service hardening – Configure services with minimal privileges
- File system security – Implement proper file permissions
- Registry security – Secure Windows registry settings
Organizational Measures
- Privilege management – Implement formal privilege management processes
- Regular audits – Review user access and privileges
- Incident response – Prepare for privilege escalation incidents
- Security training – Educate users about privilege escalation risks
Response and Recovery
Immediate Actions
- Isolate compromised systems – Prevent further access
- Revoke elevated privileges – Remove unauthorized access
- Monitor for persistence – Check for backdoors or persistence mechanisms
- Document incident – Record all details of the escalation
Investigation Steps
- Forensic analysis – Examine systems for evidence
- Privilege audit – Review all user privileges
- Root cause analysis – Identify how escalation occurred
- Corrective actions – Implement measures to prevent recurrence
Best Practices
- Implement least privilege – Grant minimal necessary permissions
- Regular privilege reviews – Audit user access regularly
- Use privileged access management – Control elevated access
- Monitor for anomalies – Watch for unusual privilege usage
- Keep systems patched – Regular security updates
- Security awareness training – Educate users about risks
Quick Facts
Severity Level
9/10
Goal
Gain elevated system privileges
Types
Vertical (higher privileges), horizontal (same level)
Methods
Exploits, misconfigurations, social engineering
Impact
Data breach, system compromise, lateral movement
Related Terms