From the course: CCSP Cert Prep: 4 Cloud Application Security
Unlock the full course today
Join today to access over 24,300 courses taught by industry experts.
Privilege escalation
From the course: CCSP Cert Prep: 4 Cloud Application Security
Privilege escalation
- [Instructor] Software developers must take care to write code that is not susceptible to privileged escalation attacks. These attacks seek to take normal user accounts and transform them into accounts with administrative rights. This can be especially dangerous on systems that have external exposures, allowing someone on the internet to take control of a server. These privilege escalation vulnerabilities often arise as a result of buffer overflow issues or other security issues in code that allow an end user to execute arbitrary code on the server. When the end user gets access to the underlying operating system, they can take advantage of privilege escalation vulnerabilities to leverage that access into gaining administrative privileges. There are some basic mitigation strategies that developers and operations teams can take to reduce the likelihood of successful privileged escalation attacks. First, developers…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Common cloud vulnerabilities5m 36s
-
(Locked)
Application security4m 13s
-
(Locked)
Preventing SQL injection4m 25s
-
(Locked)
Understanding cross-site scripting3m 17s
-
(Locked)
Request forgery4m 8s
-
(Locked)
Directory traversal3m 6s
-
(Locked)
Overflow attacks3m 21s
-
(Locked)
Cookies and attachments4m 25s
-
(Locked)
Session hijacking4m 8s
-
(Locked)
Code execution attacks2m 43s
-
(Locked)
Privilege escalation1m 56s
-
-
-
-
-
-
-