The UnHoly Trinity of Cyber Security

 The first 3 stages of Hacking.

1. Information Gathering. ℹ️

2. Scanning and Enumeration. 📡

3. Exploitation. 👨🏾‍💻


Privilege Escalation. 

• A privilege escalation attack is a cyberattack to gain illicit access of elevated rights, permissions, entitlements, or privileges beyond what is assigned for an identity, account, user, or machine. This attack can involve an external threat actor or an insider threat.


(Src.) https://www.crowdstrike.com/cybersecurity-101/privilege-escalation/

Cybersecurity 101 › What is Privilege Escalation?

WHAT IS PRIVILEGE ESCALATION?

Bart Lenaerts-Bergmans - June 3, 2022

As organizations rely more on remote work capabilities and larger cloud systems, their vulnerability to cyberattacks increases. Privilege escalation attacks are a prevalent and complex threat, and any network can become a target.

Organizations need multiple defense strategies when any asset can become an entry point for intruders. Understanding the privilege escalation process is an important first step toward prevention and defense against extensive network attacks.

What Is Privilege Escalation?

A privilege escalation attack is a cyberattack designed to gain unauthorized privileged access into a system. Attackers exploit human behaviors, design flaws or oversights in operating systems or web applications. This is closely related to lateral movement — tactics by which a cyberattacker moves deeper into a network in search of high-value assets.

(Src.) https://www.crowdstrike.com/cybersecurity-101/privilege-escalation/



Comments

Popular posts from this blog

Python 2 HTML

"Cookie Grabber", XSS Attack Example

Blackbox.ai Convo - Disallow useragent error & remote emulation detection