gptkbp:instanceOf
|
Cybersecurity Concept
|
gptkbp:cause
|
gptkb:Data_Breach
Unauthorized Access
System Compromise
|
gptkbp:describedBy
|
gptkb:OWASP_Top_Ten
gptkb:MITRE_ATT&CK_Framework
|
gptkbp:detects
|
Intrusion Detection Systems
Log Analysis
Security Monitoring
|
gptkbp:example
|
gptkb:DLL_Injection
Abusing Service Permissions
Bypassing UAC
Exploiting Sudo Vulnerability
Kernel Exploit
Token Impersonation
|
gptkbp:exploits
|
Social Engineering
Misconfiguration
Software Vulnerability
Unpatched Systems
Weak Permissions
|
gptkbp:hasType
|
gptkb:Horizontal_Privilege_Escalation
gptkb:Vertical_Privilege_Escalation
|
https://www.w3.org/2000/01/rdf-schema#label
|
Privilege Escalation
|
gptkbp:mitigatedBy
|
gptkb:Access_Control_Lists
gptkb:Least_Privilege_Principle
Security Auditing
Patching Software
User Account Management
|
gptkbp:occurredIn
|
gptkb:Windows
gptkb:macOS
gptkb:Linux
Mobile Devices
Cloud Environments
|
gptkbp:partOf
|
gptkb:Cyber_Attack_Lifecycle
|
gptkbp:prevention
|
Multi-Factor Authentication
User Education
Regular Updates
Security Best Practices
|
gptkbp:relatedTo
|
gptkb:Access_Control
gptkb:Computer_Security
Vulnerability
|
gptkbp:target
|
gptkb:Red_Team_Operations
gptkb:Advanced_Persistent_Threats
malware
|
gptkbp:usedBy
|
gptkb:Penetration_Testers
Attackers
|
gptkbp:bfsParent
|
gptkb:File_Inclusion_Attacks
|
gptkbp:bfsLayer
|
5
|