Attack Phase: Privilege Escalation Flashcards
1
Q
Methods you can use to escalate your privileges:
A
- Deploy password crackers
- Deploy Trojans
- Social Engineering
2
Q
General notes:
A
- This is about the time you attempt a password crack, via brute force or a dictionary based attack, or otherwise
- Generally, the interior is much more vulnerable than the exterior perimeter
- Adequately escalating your privileges allows you to have control over the full functionality of a device. Meaning you can install whatever you like, run whichever commands you like, edit what you like, extract all the data you like (supposedly), all that good wholesome shoite.