The Pentesting Guide
TwitterBlog
  • The Pentesting Guide
  • โ„น๏ธ0 - Pre-Engagement
  • ๐Ÿ”1 - Information Gathering
  • Passive (OSINT)
  • Active
    • ๐Ÿ•ต๏ธHUMINT
    • WIFI
    • IP & Port Scanning
    • Services
      • 21 - FTP
      • 22 - SSH
      • 25 - SMTP
      • 53 - DNS
      • 80,443 - WEB
      • 88 - Kerberos
      • 110 - POP3
      • 111 - rpcbind
      • 161 - SNMP
      • 389 - LDAP
      • 139,445 - SMB
      • Active Directory
  • ๐Ÿ’ฃ2 - Exploitation
  • Brute Forcing
  • WEB
    • Apache Tomcat
    • Authentication
    • Broken Access Control
    • Cache poisoning
    • Clickjacking
    • CORS
    • CSRF
    • File Inclusion
    • Host Header Injection
    • HTTP Request Smuggling
    • Information disclosure
    • JWT
    • OS command injection
    • PHP deserialisation
    • SQLi
    • SSRF
    • SSTI
    • Shellshock
    • Unrestricted File Upload
    • XSS
    • XXE
  • Web (OWASP Test cases)
    • 4.1 Information Gathering
    • 4.2 Configuration and Deployment Management Testing
    • 4.3 Identity Management Testing
    • 4.4 Authentication Testing
    • 4.5 Authorization Testing
    • 4.6 Session Management Testing
    • 4.7 Input Validation Testing
    • 4.8 Testing for Error Handling
    • 4.9 Testing for Weak Cryptography
    • 4.10 Business Logic Testing
    • 4.11 Client-side Testing
    • 4.12 API Testing
  • WIFI
  • HUMINT
    • ๐ŸŽฃGophish (Phishing)
    • Malicious Phishing Files
    • Phishing Evaluation
  • BoF - Windows(x86)
  • Active Directory
    • Kerberos
    • GPOs
    • Certificates
    • LAPS
    • Domain Trusts
  • ๐Ÿ‘ฟ3 - Post Exploitation
  • File transfer
  • Shells
  • Situational Awareness
    • Containers and VMs
    • Linux
    • Windows
      • Dumping Credentials
      • Countermeasure Evasion
    • Active Directory
      • BloodHound & SharpHound
  • General
    • Linux
    • Windows
  • Local Privilege Escalation
    • Linux
    • Windows
  • Persistance
    • Windows
  • Cracking
  • Pivoting
    • Tunnelling & Port Forwarding
  • Lateral Movement
  • WIFI
  • ๐Ÿ““4 - Report
  • ๐Ÿงน5 - House cleaning
Powered by GitBook
On this page

Local Privilege Escalation

Privilege escalation occurs when an attacker exploits a bug, a design flaw or a misconfiguration in a software being executed with higher privileges to gain access to protected resources or gain code execution with elevated privileges.

Nonetheless, there are two types of privilege escalation:

  • Vertical privilege escalation: This is the actual privilege elevation, where an attacker with lower permissions can access functions or content reserved for higher privilege users. For example, an attacker can read the file /etc/shadow on a system thanks to a path traversal vulnerability in an application being executed as root.

  • Horizontal privilege escalation: The horizontal privilege escalation, pretty common in lateral movements techniques, occurs when an attacker takes over other accounts with almost the same privileges as the attacker. For example, an attacker can obtain an NTLM hash of one user on an AD environment to access a different computer.

Last updated 1 year ago