• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » What is Privilege Escalation

By Abhishek Ghosh February 10, 2024 8:04 am Updated on February 10, 2024

What is Privilege Escalation

Advertisement

Privilege escalation is the exploitation of a computer bug or a design or configuration error in software with the aim of giving a user or application access to resources that cannot be used with limited rights. Most computer systems are designed as multi-user systems that include a concept for managing access rights. Privilege escalation means that a user is given rights that he or she does not normally have. These permissions can be used to delete files, retrieve and modify other users’ private information. It is also possible to install unwanted programs. Privilege escalation occurs when there are bugs in the system in question that allow the security concept to be bypassed.

There are two variants:

  • Vertical privilege escalation: Elevation of access rights by a user or application with the aim of being able to use resources that are actually reserved for more privileged users, usually from other user groups. Example: Installation of driver software by a user who has gained administrative rights.
  • Horizontal privilege escalation: A normal user accesses features or content reserved for other normal users. For example, User A and User B belong to the same user group, but User B also has the right to access the network. By escalating rights horizontally, User A also obtains this right.
What is Privilege Escalation

 

Vertical Privilege Escalation

 

This type of privilege escalation occurs when the user or the application process is able to gain administrator or even system privileges, possibly even through kernel operations.

Advertisement

---

Often, highly privileged processes require that entered data comply with the interface specification and do not check it. An attacker may then be able to exploit this requirement in such a way that unauthorized code is executed by the highly privileged application.

Some Windows system services are configured to run in the context of the system user account. A vulnerability, such as a buffer overflow, could be exploited to execute arbitrary code in the context of the system user account.
For older versions of the Microsoft Windows operating system, the screensaver runs in the context of the system user account. Any account that was able to replace the screensaver application with its own application gained system privileges as a result.

In some versions of the Linux kernel, it was possible to obtain root privileges through null pointer dereference. The cause was a mutex in the kernel that was released too early.

Certain versions of the Linux kernel made it possible to write a program that could create a child process and set its current directory to it. This child process has been flagged to create a memory dump in the event of a crash. Subsequently, the child trial was artificially terminated. The dump was stored in the currently set directory, i.e. in /root/home, and the root account was entered as the owner. Cron now executed the file automatically.

Because the contents of the file were defined by the attacker in the original program, this allowed the attacker to execute arbitrary code with root privileges.

Cross-zone scripting is a variant of attack in which a website subverts the security model of web browsers in order to execute code on the client computer with higher privileges.
Another variant of privilege escalation is called jailbreaking. This refers to unlocking or bypassing mostly DRM-protected systems, for example to run unshared apps on the iPhone or to use homebrew computer programs on game consoles. These systems usually work on the basis of a sandbox, from which privilege escalation is used.

 

Horizontal Privilege Escalation

 

Horizontal privilege escalation occurs when the attacker manages to gain access to resources that are reserved for another user, who is not highly privileged himself. As a result, the application or user performs actions in a different security context than originally intended by the application developer or system administrator. This problem is common in web applications. Example:

User A has access to their account in an Internet banking application.
User B has access to his account in the same internet banking application.

The vulnerability occurs when User A is able to access User B’s account through malicious activity.
This malicious activity can be made possible by weaknesses or gaps in the shared web application.

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to What is Privilege Escalation

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • Windows 7 Right Click Menu Tips,Tricks and Tutorials : Index

    Windows 7 Right Click Menu Tips,Tricks and Tutorials those has been published within The Customize Windows till date is listed here along with description.

  • What is Superuser (Root Account) in Unix & Linux

    The root account or superuser account is the user account that must be created when installing an operating system and is equipped with the most extensive access rights. This account is not intended for day-to-day use of the system, but only for special administrative tasks because it involves extensive risks. For example, in the guide […]

  • How to Upgrade Kernel of Ubuntu Server 16.04 (Cloud Server)

    Here is How to Upgrade Kernel of Ubuntu Server 16.04 Cloud Server to Latest. Newer enablement stacks are meant for server including cloud.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

vpsdime

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Cloud-Powered Play: How Streaming Tech is Reshaping Online GamesSeptember 3, 2025
  • How to Use Transcribed Texts for MarketingAugust 14, 2025
  • nRF7002 DK vs ESP32 – A Technical Comparison for Wireless IoT DesignJune 18, 2025
  • Principles of Non-Invasive Blood Glucose Measurement By Near Infrared (NIR)June 11, 2025
  • Continuous Non-Invasive Blood Glucose Measurements: Present Situation (May 2025)May 23, 2025
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2026 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy