Privilege Escalation Task
Jump to navigation
Jump to search
A Privilege Escalation Task is a security task that attempts to gain elevated access rights beyond those initially granted to a user or system process (to perform unauthorized actions).
- Context:
- Task Input: Initial Access Level, System Permissions
- Task Output: Elevated Access, Extended Permissions
- Task Performance Measure: Success Metrics such as privilege level gained, persistence, and detection avoidance
- ...
- It can exploit System Vulnerability through attack techniques.
- It can bypass Access Control through security flaws.
- It can manipulate Process Permission through elevation methods.
- It can leverage System Trust through privilege inheritance.
- ...
- It can establish Persistent Access through backdoor mechanisms.
- It can maintain Elevated State through persistence techniques.
- It can circumvent Security Control through bypass strategys.
- ...
- It can range from being a Basic Permission Elevation to being an Advanced Privilege Escalation, depending on its attack complexity.
- It can range from being a Temporary Access Gain to being a Persistent System Control, depending on its implementation approach.
- ...
- Examples:
- Operating System Privilege Escalations, such as:
- Application Level Escalations, such as:
- Device Level Escalations, such as:
- Network Level Escalations, such as:
- ...
- Counter-Examples:
- Authorized Access Change, which follows permission protocol.
- Normal Permission Grant, which maintains security control.
- System Update Task, which modifies system state with authorization.
- See: Security Attack Task, Access Control Bypass, System Permission Management, Root Access Task.