Skip to main content

Privileges

  • Chapter
  • First Online:
Privileged Attack Vectors
  • 1292 Accesses

Abstract

Today, privileges based on credentials are one of the lowest-hanging fruits in the attack chain. They are currently the easiest method for a threat actor to own a resource and, ultimately, the entire environment. These threats include

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.globalpartnership.org/blog/education-right-not-privilege

  2. 2.

    Who is John Titor? https://en.wikipedia.org/wiki/John_Titor

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Morey J. Haber

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Haber, M.J. (2020). Privileges. In: Privileged Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-5914-6_2

Download citation

Publish with us

Policies and ethics