Privilege Escalation
HOME Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities. Examples of elevated access include:
SYSTEM/root level
local administrator
user account with
admin-like access
user accounts with access to specific system or perform
specific function
These techniques often overlap with Persistence techniques,
as OS features that let an adversary persist can execute in an elevated context.
Techniques