Exploitation for Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Security constructs such as permission levels will often hinder access to information and use of certain techniques, so adversaries will likely need to perform privilege escalation to include...
BY SOURCE
PROCEDURES (52)
Auto-extracted: 12 detections for privilege
Auto-extracted: 5 detections for driver
Auto-extracted: 5 detections for unusual
Auto-extracted: 4 detections for general monitoring
Auto-extracted: 3 detections for suspicious
Auto-extracted: 3 detections for service
Auto-extracted: 2 detections for inject
Auto-extracted: 2 detections for kernel
Auto-extracted: 2 detections for privilege
Auto-extracted: 2 detections for lateral
Auto-extracted: 2 detections for inject
Auto-extracted: 2 detections for remote
Auto-extracted: 2 detections for service
Auto-extracted: 2 detections for child process
Auto-extracted: 2 detections for api
Auto-extracted: 2 detections for persist
Auto-extracted: 2 detections for privilege
Auto-extracted: 2 detections for privilege
Auto-extracted: 2 detections for azure
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for driver
Auto-extracted: 1 detections for dns
Auto-extracted: 1 detections for inject
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for dns
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for child process
Auto-extracted: 1 detections for kernel
Auto-extracted: 1 detections for kernel
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for command line monitoring
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for child process
Auto-extracted: 1 detections for bypass
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for suspicious