课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Privilege escalation

Privilege escalation

- [Narrator] Software developers must take care to write code that is not susceptible to privilege escalation attacks. These attacks seek to take normal user accounts and transform them into accounts with administrative rights. This can be especially dangerous on systems that have external exposures, allowing someone on the internet to take control of a server. These privilege escalation vulnerabilities often arise as a result of buffer overflow issues or other security issues in code that allow an end user to execute arbitrary code on the server. When the end user gets access to the underlying operating system, they can take advantage of privilege escalation vulnerabilities to leverage that access into gaining administrative privileges. There are some basic mitigation strategies that developers and operations teams can take to reduce the likelihood of successful privilege escalation attacks. First, developers should perform input validation on all input received from end users. This…

内容