From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,700 courses taught by industry experts.

Escalating privileges

Escalating privileges

- [Instructor] In this section, we will explore the concept and the techniques of privilege escalation. As an ethical hacker, gaining a foothold in a system is basically just the beginning. To fully assess the security posture of an environment, you may need to escalate your privileges, moving from a lower level user to an administrator or to root level access, right? So let's say that I'm logged in, in this case as user Omar, actually, you see here also user Omar and I compromise a system. In order for me to escalate privileges, I can do it in two different ways. I can do it horizontally, and I'm going to explain that later, and vertically. But let's start with vertical privilege escalation. And in this case, whenever you're doing vertical privilege escalation, you may have a user like Omar, and then this may be a lower level or low privileged user in the system. And then I can find other vulnerabilities like misconfigure sudo configurations in a Linux device or misconfigure…

Contents