Source |
McAfee Labs |
Identifiant |
2671779 |
Date de publication |
2021-04-20 15:27:41 (vue: 2021-04-20 19:05:15) |
Titre |
Access Token Theft and Manipulation Attacks – A Door to Local Privilege Escalation |
Texte |
Executive Summary Many malware attacks designed to inflict damage on a network are armed with lateral movement capabilities. Post initial infection, such malware would usually need to perform a higher privileged task or execute a privileged command on the compromised system to be able to further enumerate the infection targets and compromise more systems on […]
|
Envoyé |
Oui |
Condensat |
able access are armed attacks capabilities command compromise compromised damage designed door enumerate escalation execute executive further higher infection inflict initial lateral local malware manipulation many more movement need network perform post privilege privileged such summary system systems targets task theft token usually would |
Tags |
Malware
|
Stories |
|
Notes |
|
Move |
|