Category: Business, Database, Security, Data

by Privilege escalation takes place whenever a cyber-attacker deploys a bug, design flaw or any form of a configuration error in an application or operating system for gaining elevated and direct access to the resources that are usually not available to a user. The attacker now uses the earned privileges for stealing confidential data and deploy malware with the intent of damaging the OS, server applications and ultimately, the reputation of an organization. This type of attack on organization data can be carried out even by an unsophisticated hacker for gaining the escalate privileges, the reason being most of the business organizations don’t use sufficient security measures and controls.

In standard practice, Windows uses access tokens for determining the owners of all processes that are running.

Related Articles