Read the original article: In-Depth Understanding of Privilege Escalation Attacks
Privilege Escalation: What Is It?
Privilege escalation takes place whenever a cyber-attacker deploys a bug, design flaw or any form of a configuration error in an application or operating system for gaining elevated and direct access to the resources that are usually not available to a user. The attacker now uses the earned privileges for stealing confidential data and deploy malware with the intent of damaging the OS, server applications and ultimately, the reputation of an organization. This type of attack on organization data can be carried out even by an unsophisticated hacker for gaining the escalate privileges, the reason being most of the business organizations don’t use sufficient security measures and controls.
Types of Privilege Escalation
Following are the two types of privilege escalation attacks-
Read the original article: In-Depth Understanding of Privilege Escalation Attacks