Hacking Principals
Hacking Principals
Privilege escalation refers to an attack in which the attacker gains access to a user account
and determines how to increase the rights attached to that account (vertically), uses that
access to gain access to additional user accounts (horizontally), or both. The attacks aim to
break into networks to steal data, disrupt business operations, or create backdoors that will
give access to the systems in the future. The following are the mitigation strategies for this
kind of attack:
Password Policies
Users must carefully select one-of-a-kind, safe passwords and change them frequently. Since
this is challenging to put into reality, employing two-factor authentication is a sensible way to
get around the risky nature of passwords, especially for crucial systems and administrator
accounts.
The organization’s user base should be examined, and user accounts and groups should be
reconfigured to ensure everyone has a specific purpose and the least amount of file access
and capabilities possible. This guarantees that the likelihood of privilege escalation is
account; even administrators and super-users should only have limited access to the systems
to which they are authorized to get access or exercise control. No administrator needs
Most significantly, user accounts should be terminated when they are no longer needed, and a
purposes. Default configurations that operate unnecessary services ought to be found and shut
down. Similarly, only those individuals and groups who need write access should be able to
edit files.
Since many database systems come with hazardous defaults, much effort must be done to
guarantee that databases are safe and secured with strong authentication. Data at rest should,
whenever possible, be encrypted. Sanitize all user inputs and patch databases to prevent
It is advisable to delete or rename user accounts that are no longer in use. The default login
information should be modified for every hardware system, including routers, printers, and
IoT devices. An attacker can execute a privilege escalation attack with just one device,
Attack Taxonomy
Buffer overflow
Buffer flow is a common software coding issue attackers may exploit to acquire system
access. When a buffer contains more data than it can handle, it overflows, spilling data into
nearby storage. As a result, buffer overflows are usually caused by coding faults. An injection
Privilege escalation
The goal of a privilege escalation assault is to acquire access to a network, applications, and
attacks happen when a hacker gains access to a user account to take over the user’s role,
whereas horizontal attacks happen when a hacker gains access to a user account with
Rootkits
Computer software frequently hides that it or other software exists and is designed to grant
access to a computer or parts of its program that would not typically be allowed.
Trojans
An assault degrades a system by tricking users into believing it has other objectives. They can
convey destructive payloads, establish a backdoor, and steal personal data. It has a malware
classification.
Backdoors
Attacks of this kind allow threat actors to control a system remotely. Often, the ultimate step
in gaining total control of a system is to use the backdoor. It has a Trojan classification.
Viruses
They are categorized as malware since they can replicate and proliferate once installed on a
user’s system and attach to other programs. These are their classifications: There are many
viruses, including resident viruses, browser hijackers, web scripting viruses, macro viruses,
it to run hand-picked machine instructions in existing program code’s subroutines, much like
Attacks of this kind manipulate victims into evading common security precautions. Attackers
use this to gain user trust and get unauthorized access to systems and networks for their
financial gain. The types of attacks are broken down into the following groups: phishing
assaults, smishing assaults, baiting, tailgating pretexting, scareware, and watering hole
assaults.
It is necessary to first open the Kioptrix. The pictures show the Kioptrix home page.
Launch the Kioptrix workstation, then search your local network for the victim's IP address.
The netdiscover command is utilized for this.
I started by acquiring the IP address of the target computer before checking it for open ports
and protocols. The Nmap sv aggressive command was used to run a version scan on the
starts Metasploit. In order to access the target machine at this point, the exploit module is
used. The screenshot displays the search results for the phrase "transopen."
The default payload is already selected in the screenshots. The options must now be
configured. The RHOSTS variable is used to store the destination machine's IP address.
LHOST is used to save the attacker's IP address, as shown in the screenshot. Finally, the
I gained root immediately after performing the exploit. The screenshot depicts a root login.
Since the computer already grants us root access, we can keep it by creating a new account
Upon adding a user, we immediately grant them full admin privileges. To do this, we include
the user in the sudoers file. Some programs can occasionally be accessed as root, and the file
To have unrestricted access, add "ALL=(ALL) ALL" along with the newly created user. As