
Privilege Escalation Attacks and Mitigation Strategies
Learn about privilege escalation attacks, including vertical and horizontal privileges, vulnerabilities that lead to these attacks, and effective mitigation strategies to safeguard against unauthorized access and data breaches.
Uploaded on | 0 Views
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
A QUICK BACKGROUND Most systems are designed for multiple users Privileges are what a user is permitted to do on the system Privilege escalation is gaining access to privileges that you were not granted Privilege escalation occurs in two forms Horizontal Vertical
VERTICAL VS HORIZONTAL PRIVILEGES Vertical privilege escalation ---where a lower privilege user gains access to functions or content reserved for higher privilege users Horizontal privilege escalation where a normal user accesses functions or information reserved for other users of the same level
VERTICAL ESCALATION Sometimes, high-privilege applications assume that they will only be provided with input that matches its interface specification. This often leads to attackers exploiting the application to run unauthorized code An example of this would be Jailbreaking
VULNERABILITIES THAT LEAD TO THESE ATTACKS Predictable session ID s Session fixation Cross-site scripting Weak passwords Hijacking of session cookies Keystroke logging
MITIGATION STRATEGIES Data execution prevention Address space layout randomization Running applications with least privilege Use up-to-date antivirus software Patching Software encryption