A white paper published by McAfee in 2005. All citations and credits for any part or content should be for McAfee. McAfee however holds no liability for any thing in this blog since this blog is created by a third party without their express consent. This blog is created for academic purposes only.

Privilege Escalation Exploits

Privilege escalation exploits grant administrator or root level access to users who previously did not have such access. For example, an account exists on all Windows NT and 2000 servers called “Guest.” This account, by default, has no password. Anyone can log on to the server using this “Guest” account and then use a common privilege escalation exploit call “GetAdmin” to gain administrator level access to the system. Many other privilege escalation exploits exist, such as HackDLL and others. These exploits are very useful to an attacker, since they allow anyone who has any level of access to a system, to easily elevate their privilege level and perform any activities they desire.