Escalation of Privilege

When an attacker can elevate his privilege on a system from a low-level user to that of an administrator, escalation of privilege has been accomplished. Privilege escalation techniques are shown below.

Vertical Privilege Escalation Horizontal Privilege Escalation
A user or application with low privilege accesses content or functions reserved for high-privilege users A normal user accesses content or functions of another normal user

To prevent a privilege violation, applications and operating systems use rings of protection. Rings of protection provide an operating system with various levels at which code is executed. A ring of circles illustrate the various levels in which code is executed indicating less privilege moving out from the center of the circle. Ring 0: Kernal, most privileged, Ring 1: Device Drivers, Ring 2: Device Drivers, Ring 3: Applications, least privileged. Moving outward corresponds to less privilege as shown in Figure 1.

Figure 2 – Rings of protection

Figure 2 – Rings of protection



Source: Dominique Hubbard and Chatavia Vaval, https://www.edjet.com/scorm-content/edjet-prod-uploads/1bbb6bd2940fd96497953e96a7011e315c141cf3/771aacefbe2ed9e16b17173a36b691df/story_content/WebObjects/6MLNkf2prXH/lesson10/index.html
Creative Commons License This work is licensed under a Creative Commons Attribution 3.0 License.

Last modified: Saturday, 21 November 2020, 5:35 PM