APromptRiskDBThreat intelligence atlas
ATT&CK AI Context

TA0004 - Privilege Escalation

The adversary is trying to gain higher-level permissions. Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulne...

ATT&CK AI Context

Record summary

A quick snapshot of what this page covers.

Records1Records included in this view.
SourcePublicBuilt from public source data.
ModeStaticPrepared as a ready-to-read page.

ATT&CK object

The broader cybersecurity technique connected to these AI records.

The adversary is trying to gain higher-level permissions.

Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their objectives. Common approaches are to take advantage of system weaknesses, misconfigurations, and vulnerabilities. Examples of elevated access include:

  • SYSTEM/root level
  • local administrator
  • user account with admin-like access
  • user accounts with access to specific system or perform specific function

These techniques often overlap with Persistence techniques, as OS features that let an adversary persist can execute in an elevated context.

ATT&CK ID
TA0004
STIX ID
x-mitre-tactic--5e29b093-294e-49e9-a803-dab3d73b77dd
Name
Privilege Escalation
Connected AI records
1

Connected AI records

AI security records connected to this cybersecurity technique.

Source

Where this page information comes from.