Cybercriminals target privileged access on Windows and Linux systems to move around, steal credentials, deploy malware, and cause disruption. Through privilege escalation techniques, attackers leverage their initial foothold on workstations and servers to obtain higher-level Domain Administrator, Local Administrator, and NT Authority/System access.
On Linux, condition-based privilege elevation is typically enabled via the sudo (Super User DO) command for user accounts, but this is a complex process which can be difficult to manage and makes Linux systems particularly vulnerable to privilege escalation attacks. Attackers attempt to abuse sudo misconfigurations to get root access and achieve their goals.
To protect workstations and servers from attack, security professionals must know the latest strategies to identify and mitigate unwanted privilege escalation.
Join Delinea Chief Security Scientist and Advisory CISO Joseph Carson as he leads a discussion and live demonstration of a privilege escalation attack. He’ll walk through several tools hackers use to automatically assess Windows and Linux systems for viable privilege escalation (MITRE ATT&CK TA0004) opportunities:
Who should attend this webinar?
What will I learn?
Get answers to these important questions:
What will I receive from attending?