Privilege Escalation Attack is a method is to steal information by first gaining lower-level access to your network. An attacker can gain access to the network using a non-admin user account, and the next step would be to gain administrative privilege.
Privilege Escalation Attack is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications.
Not every Privilege Escalation Attack will initially provide an unauthorized user with full access to the targeted system. In those circumstances, privilege escalation is required. Successful privilege escalation attacks grant hackers privileges that normal users don’t have.
Escalation of Privileges
- Horizontal Privilege Escalation occurs when a malicious user attempts to access resources and functions that belong to peer users, who have similar access permissions.
- Vertical privilege escalation requires the attacker to grant himself higher privileges. This Privilege Escalation Attack is typically achieved by performing kernel-level operations that allow the attacker to run unauthorized code. In most Privilege Escalation Attack, the hacker first logs in with a low-end user account. Then he can search for exploitable flaws in the system that can be used to elevate his privileges.
Elements of the Privilege Escalation Attack
There are two key components of Windows that are behind an elevation of privilege attack access tokens and the SID History. The access token is basically a list of the user’s SID and the SIDs of any groups of which the user may be a member. The SID History is an Active Directory attribute that tracks the changes of an object’s SID as the object moves from one domain to another.
When a user logs into the system, the user’s access token will contain his or her present SID, the SIDs of any groups that he or she may belong to, and any SIDs that were previously associated with the user account through the SID History. Added together, these two elements determine whether the user can access the network and what level of access he or she will have.