From the course: Penetration Testing and Ethical Hacking

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Vulnerability exploitation and privilege escalation

Vulnerability exploitation and privilege escalation

From the course: Penetration Testing and Ethical Hacking

Vulnerability exploitation and privilege escalation

- [Instructor] Vulnerability Exploitation and Privilege Escalation. We're continuing on our path of system hacking, so let's go ahead and continue with these courses and learn some more valuable information. So let's get started. Vulnerability Exploitation. In cybersecurity, an exploit is also termed as a code intended to exploit or exploit the vulnerability. So these exploits are not only developed by adversaries, but also security researchers as proof of concept. So using these exploit codes specific to each vulnerability, attackers can intrude into the vulnerable system and create persistency. Now, consider a scenario where the vulnerability is a newly identified or a zero-day that's not been patched. These exploits are zero-day exploits. Escalating Privileges. Escalating privileges is further classified into two types, horizontal privilege escalation, and vertical privileges escalation. So in the horizontal privileges escalation, an attacker basically attempts to take command of…

Contents