Privilege Escalation

GPTKB entity

Statements (48)
Predicate Object
gptkbp:instanceOf Cybersecurity Concept
gptkbp:cause gptkb:Data_Breach
Unauthorized Access
System Compromise
gptkbp:describedBy gptkb:OWASP_Top_Ten
gptkb:MITRE_ATT&CK_Framework
gptkbp:detects Intrusion Detection Systems
Log Analysis
Security Monitoring
gptkbp:example gptkb:DLL_Injection
Abusing Service Permissions
Bypassing UAC
Exploiting Sudo Vulnerability
Kernel Exploit
Token Impersonation
gptkbp:exploits Social Engineering
Misconfiguration
Software Vulnerability
Unpatched Systems
Weak Permissions
gptkbp:hasType gptkb:Horizontal_Privilege_Escalation
gptkb:Vertical_Privilege_Escalation
https://www.w3.org/2000/01/rdf-schema#label Privilege Escalation
gptkbp:mitigatedBy gptkb:Access_Control_Lists
gptkb:Least_Privilege_Principle
Security Auditing
Patching Software
User Account Management
gptkbp:occurredIn gptkb:Windows
gptkb:macOS
gptkb:Linux
Mobile Devices
Cloud Environments
gptkbp:partOf gptkb:Cyber_Attack_Lifecycle
gptkbp:prevention Multi-Factor Authentication
User Education
Regular Updates
Security Best Practices
gptkbp:relatedTo gptkb:Access_Control
gptkb:Computer_Security
Vulnerability
gptkbp:target gptkb:Red_Team_Operations
gptkb:Advanced_Persistent_Threats
malware
gptkbp:usedBy gptkb:Penetration_Testers
Attackers
gptkbp:bfsParent gptkb:File_Inclusion_Attacks
gptkbp:bfsLayer 5