Privilege Escalation Attacks and Mitigation Strategies

privilege escalation attacks n.w
1 / 6
Embed
Share

Learn about privilege escalation attacks, including vertical and horizontal privileges, vulnerabilities that lead to these attacks, and effective mitigation strategies to safeguard against unauthorized access and data breaches.

  • Privilege Escalation
  • Security Vulnerabilities
  • Mitigation Strategies
  • Cybersecurity
  • Threat Mitigation

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. PRIVILEGE ESCALATION ATTACKS

  2. A QUICK BACKGROUND Most systems are designed for multiple users Privileges are what a user is permitted to do on the system Privilege escalation is gaining access to privileges that you were not granted Privilege escalation occurs in two forms Horizontal Vertical

  3. VERTICAL VS HORIZONTAL PRIVILEGES Vertical privilege escalation ---where a lower privilege user gains access to functions or content reserved for higher privilege users Horizontal privilege escalation where a normal user accesses functions or information reserved for other users of the same level

  4. VERTICAL ESCALATION Sometimes, high-privilege applications assume that they will only be provided with input that matches its interface specification. This often leads to attackers exploiting the application to run unauthorized code An example of this would be Jailbreaking

  5. VULNERABILITIES THAT LEAD TO THESE ATTACKS Predictable session ID s Session fixation Cross-site scripting Weak passwords Hijacking of session cookies Keystroke logging

  6. MITIGATION STRATEGIES Data execution prevention Address space layout randomization Running applications with least privilege Use up-to-date antivirus software Patching Software encryption

Related


More Related Content