Nouvelle réglementation de cybersécurité 2026 en vigueur au Maroc. Obtenir un audit de conformité gratuit →
← Retour au blog
Ethical-hacking 2025-09-01 ⏱️ 12 min

Privilege escalation: from guest to administrator access

Privilege Escalation: From Guest to Administrator

In almost every cyberattack, the initial compromise gives the attacker low-level access (like a normal user). To cause real damage, they must perform Privilege Escalation.

Types of Escalation

  • Vertical: A normal user becomes an Admin/Root.
  • Horizontal: A user gains access to another user's data.

Common Techniques

Attackers look for misconfigured file permissions, unpatched kernel vulnerabilities, or insecure service paths.

Stop Internal Threats

📱 Contact Cayvora Security via WhatsApp

Besoin d'un audit de sécurité ?

Contactez Cayvora pour une consultation gratuite et protégez votre entreprise contre les cybermenaces.

📱 Contacter via WhatsApp

Articles connexes