Attack Phase: Privilege Escalation Flashcards

1
Q

Methods you can use to escalate your privileges:

A
  • Deploy password crackers
  • Deploy Trojans
  • Social Engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

General notes:

A
  • This is about the time you attempt a password crack, via brute force or a dictionary based attack, or otherwise
  • Generally, the interior is much more vulnerable than the exterior perimeter
  • Adequately escalating your privileges allows you to have control over the full functionality of a device. Meaning you can install whatever you like, run whichever commands you like, edit what you like, extract all the data you like (supposedly), all that good wholesome shoite.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly