Tactic: Privilege Escalation
Technique: OS Specific
Privilege escalation is usually performed by enumerating a bag of known tricks, where the tricks themselves are often specific to the target OS.
Technique in practice
Video: linux privilege escalation methodology
Video: windows privilege escalation guide
Mitigations
Keeping the OS and its software up-to-date eliminates known vulnerabilities.
Detections
Privilege escalation detection scripts can be used to detect privilege escalation vulnerabilities within the operating system.
Documented incidents with autonomous robots
No incidents known at the time of writing.
Documented incidents in other domains
[2022] Use after free vulnerability in Linux kernel allows privilege escalation.
[2022] Windows output protection manager integer overflow local privilege escalation vulnerability.