An adversary can perform several methods to take advantage of built-in control mechanisms in order to escalate privileges on a system.Īn adversary may abuse configurations where an application has the setuid or setgid bits set in order to get code running in a different (and possibly more privileged) user’s context. Authorization has to be granted to specific users in order to perform tasks that can be considered of higher risk. ![]() Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |