CompTIA PenTest+
1 Threats, Attacks, and Vulnerabilities
1-1 Common Threat Actors
1-2 Threat Intelligence Sources
1-3 Threat Actors and Motives
1-4 Threat Actor Tactics, Techniques, and Procedures (TTPs)
1-5 Vulnerability Types
1-6 Exploit Types
1-7 Attack Types
1-8 Threat Detection and Monitoring
1-9 Threat Hunting
1-10 Incident Response
2 Architecture and Design
2-1 Security Controls
2-2 Network Architecture
2-3 Cloud and Virtualization
2-4 Web Application Security
2-5 Wireless Security
2-6 Mobile Security
2-7 IoT Security
2-8 Industrial Control Systems (ICS) Security
2-9 Physical Security
2-10 Secure Software Development
3 Tools and Code
3-1 Penetration Testing Tools
3-2 Exploitation Tools
3-3 Post-Exploitation Tools
3-4 Reporting Tools
3-5 Scripting and Automation
3-6 Programming Languages
3-7 Code Analysis
3-8 Open Source Intelligence (OSINT) Tools
4 Planning and Scoping
4-1 Penetration Testing Methodologies
4-2 Legal and Compliance Considerations
4-3 Scope Definition
4-4 Risk Assessment
4-5 Threat Modeling
4-6 Information Gathering
4-7 Asset Identification
4-8 Data Classification
4-9 Business Impact Analysis
4-10 Penetration Testing Objectives
5 Information Gathering and Vulnerability Identification
5-1 Passive Reconnaissance
5-2 Active Reconnaissance
5-3 Vulnerability Scanning
5-4 Network Mapping
5-5 Service Identification
5-6 Web Application Scanning
5-7 Wireless Network Scanning
5-8 Social Engineering Techniques
5-9 OSINT Techniques
5-10 Vulnerability Databases
6 Attacks and Exploits
6-1 Exploit Development
6-2 Buffer Overflows
6-3 SQL Injection
6-4 Cross-Site Scripting (XSS)
6-5 Cross-Site Request Forgery (CSRF)
6-6 Command Injection
6-7 Privilege Escalation
6-8 Lateral Movement
6-9 Evasion Techniques
6-10 Exploit Delivery Methods
7 Penetration Testing Process
7-1 Pre-Engagement Activities
7-2 Reconnaissance
7-3 Scanning and Enumeration
7-4 Exploitation
7-5 Post-Exploitation
7-6 Reporting
7-7 Remediation
7-8 Retesting
7-9 Documentation and Evidence Collection
7-10 Communication and Coordination
8 Reporting and Communication
8-1 Report Structure
8-2 Executive Summary
8-3 Technical Findings
8-4 Risk Assessment
8-5 Remediation Recommendations
8-6 Legal and Compliance Considerations
8-7 Presentation Skills
8-8 Communication with Stakeholders
8-9 Documentation Standards
8-10 Continuous Improvement
9 Security and Compliance
9-1 Regulatory Requirements
9-2 Industry Standards
9-3 Compliance Audits
9-4 Data Protection
9-5 Privacy Laws
9-6 Incident Response Planning
9-7 Disaster Recovery Planning
9-8 Business Continuity Planning
9-9 Risk Management
9-10 Security Awareness Training
6.7 Privilege Escalation Explained

6.7 Privilege Escalation Explained

Key Concepts

1. Privilege Escalation

Privilege Escalation is the process of gaining higher-level permissions on a system than initially granted. This can be achieved by exploiting vulnerabilities, misconfigurations, or weak permissions.

2. Vertical Privilege Escalation

Vertical Privilege Escalation involves gaining higher-level permissions within the same system or application. For example, escalating from a standard user to an administrator.

3. Horizontal Privilege Escalation

Horizontal Privilege Escalation involves gaining access to resources or information that should be accessible to a different user with similar permissions. For example, accessing another user's files on the same system.

4. Exploiting Misconfigurations

Misconfigurations in system settings or applications can lead to privilege escalation. This includes weak passwords, unnecessary services running, or insecure file permissions.

5. Exploiting Vulnerabilities

Software vulnerabilities, such as buffer overflows or SQL injections, can be exploited to gain higher-level permissions. These vulnerabilities often allow attackers to execute arbitrary code with elevated privileges.

6. Credential Reuse

Credential Reuse involves using stolen credentials from one system to gain access to another system with higher privileges. This is often facilitated by poor password management practices.

Explanation of Concepts

Privilege Escalation

Privilege Escalation is a critical step in many cyber attacks, allowing attackers to gain control over a system or network. By escalating privileges, attackers can perform actions that would otherwise be restricted, such as installing malware, modifying system settings, or exfiltrating sensitive data.

Vertical Privilege Escalation

Vertical Privilege Escalation is often achieved by exploiting vulnerabilities in system services or applications that run with higher privileges. For example, an attacker might exploit a buffer overflow in a service running as SYSTEM to gain SYSTEM-level access.

Horizontal Privilege Escalation

Horizontal Privilege Escalation typically involves exploiting weak file permissions or shared resources. For example, an attacker might access another user's files by exploiting weak permissions on a shared network drive.

Exploiting Misconfigurations

Misconfigurations can create opportunities for privilege escalation. For example, running unnecessary services with elevated privileges can provide an attacker with a foothold to exploit. Similarly, weak file permissions can allow unauthorized users to access sensitive files.

Exploiting Vulnerabilities

Software vulnerabilities are a common target for privilege escalation. For example, a buffer overflow in a web application might allow an attacker to execute arbitrary code with the privileges of the web server, potentially leading to full system compromise.

Credential Reuse

Credential Reuse is facilitated by poor password management practices, such as using the same password across multiple systems. An attacker who gains access to a user's credentials on one system can often reuse those credentials to gain access to other systems with higher privileges.

Examples and Analogies

Privilege Escalation

Consider a security guard who gains access to a restricted area by impersonating a higher-level employee. This is similar to how an attacker might escalate privileges on a system by exploiting vulnerabilities or misconfigurations.

Vertical Privilege Escalation

Think of a low-level employee who finds a way to access the CEO's office by exploiting a security flaw in the building's access control system. This is analogous to vertical privilege escalation, where an attacker gains higher-level permissions on a system.

Horizontal Privilege Escalation

Imagine a coworker who accesses another employee's desk and reads their confidential documents because the office layout allows it. This is similar to horizontal privilege escalation, where an attacker gains access to resources that should be restricted.

Exploiting Misconfigurations

Consider a bank vault that is left unlocked because the security system was improperly configured. This is akin to exploiting misconfigurations in a system to gain unauthorized access.

Exploiting Vulnerabilities

Think of a locksmith who exploits a flaw in a lock's design to create a master key. This is similar to exploiting software vulnerabilities to gain higher-level permissions on a system.

Credential Reuse

Imagine a person who uses the same key to unlock their house, car, and office. If the key is stolen, the thief can access all these locations. This is analogous to credential reuse, where stolen credentials can be used to gain access to multiple systems.