Tactic: Privilege Escalation

Technique: OS Specific

Privilege escalation is usually performed by enumerating a bag of known tricks, where the tricks themselves are often specific to the target OS.

Technique in practice

Video: linux privilege escalation methodology Video: windows privilege escalation guide

Mitigations

Keeping the OS and its software up-to-date eliminates known vulnerabilities.

Detections

Privilege escalation detection scripts can be used to detect privilege escalation vulnerabilities within the operating system.

Documented incidents with autonomous robots

No incidents known at the time of writing.

Documented incidents in other domains

    [2022] Use after free vulnerability in Linux kernel allows privilege escalation. [2022] Windows output protection manager integer overflow local privilege escalation vulnerability.