Privilege Escalation

Posts on Privilege Escalation by Teri Radichel

Teri Radichel
Cloud Security
Published in
3 min readAug 9, 2024

--

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

⚙️ Check out my series on Automating Cybersecurity Metrics. The Code.

🔒 Related Stories: Privilege Escalation | AWS Security | Application Security | Data Breaches | IAM | Penetration Testing

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Privilege escalation occurs when an attacker or malicious insider is able to leverage some system vulnerability or misconfiguration to elevate their privileges and permissions so they are able to do more than they are supposed to do. They might take over another user’s account by changing the password, create an account, injection a new subprocess into another running process, access a session, crack an administrator password or use any other method they can to get additional privileges.

Once again I was looking around in Google and some of my Medium stories aren’t there. Is that Medium blocking access to the pages, a problem with Google’s search engine, or something else? That’s why I’m publishing this today in case someone missed one of my stories on privilege escalation and especially the first…

--

--

Teri Radichel
Cloud Security

CEO 2nd Sight Lab | Penetration Testing & Assessments | AWS Hero | Masters of Infosec & Software Engineering | GSE 240 etc | IANS | SANS Difference Makers Award