Privilege Escalation: From Guest to Administrator
In almost every cyberattack, the initial compromise gives the attacker low-level access (like a normal user). To cause real damage, they must perform Privilege Escalation.
Types of Escalation
- Vertical: A normal user becomes an Admin/Root.
- Horizontal: A user gains access to another user's data.
Common Techniques
Attackers look for misconfigured file permissions, unpatched kernel vulnerabilities, or insecure service paths.