O'Reilly logo

Seven Deadliest Microsoft Attacks by Naomi Alpern, Mike Borkin, Brian Barber, Rob Kraus

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Active Directory – Escalation of Privilege

Information in this Chapter

  • Escalation of Privileges Attack Anatomy
  • Dangers with Privilege Escalation Attacks
  • Future of Privilege Escalation Attacks
  • Defenses against Escalation of Privilege Attacks

The expression and concept of “escalation of privilege” may not always be as easy to understand or defined as clearly as we may hope; the idea and act of escalating privileges equates to an attacker using his existing access to leverage additional privileges that may not normally be allowed. As it applies to network security and attacks, escalation of privileges can be something as simple as an employee leveraging a flaw in an application to obtain further access for snooping around documents ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required