All Terms
Attack Techniques intermediate

Privilege Escalation

Privilege Escalation is the exploitation of a vulnerability or misconfiguration that allows an attacker to gain elevated access rights beyond what was originally granted, moving from low-privilege to high-privilege accounts.

Privilege Escalation refers to the act of exploiting a bug, design flaw, or misconfiguration to gain elevated access to resources that are normally restricted. There are two primary forms: vertical privilege escalation, where a lower-privileged user gains higher-level access (e.g., regular user to root/administrator), and horizontal privilege escalation, where a user accesses resources belonging to another user at the same privilege level. Both forms are critical objectives in penetration testing and real-world attacks, as they determine how far an attacker can go after initial access.

Why It Matters

Privilege escalation is a pivotal stage in virtually every attack chain. An attacker who gains a low-privilege shell on a Linux server through a web vulnerability will immediately attempt to escalate to root, which unlocks full control over the system. On Windows, escalating to SYSTEM or Domain Admin provides access to Active Directory, group policies, and every resource in the domain. Common escalation vectors include SUID binaries, misconfigured sudo rules, kernel exploits, unquoted service paths, DLL hijacking, writable cron jobs, and excessive permissions on sensitive files.

For example, a pentester discovers a web application running as www-data on a Linux server. Enumerating the system, they find that /usr/local/bin/backup.sh is writable by the www-data user and is executed by a root cron job every five minutes. By modifying this script to include a reverse shell payload, the pentester gains a root shell when the cron job fires.

How Revaizor Handles This

Revaizor’s agentic AI systematically enumerates privilege escalation vectors on discovered systems, performing checks against known misconfigurations, vulnerable software versions, and weak permission models. The platform tests both vertical and horizontal escalation paths within web applications by manipulating role parameters, JWT claims, and session tokens to access administrative functionality. Revaizor chains privilege escalation findings with other discovered vulnerabilities to demonstrate complete attack narratives, showing how an initial low-severity issue can cascade into full system compromise.

Related Terms

Related Vulnerabilities

Related Articles

Related Services

Web & API Pentesting

AI-powered web and API penetration testing with autonomous tool selection and validated exploits.

Network Assessments

AI-driven network penetration testing with intelligent attack chaining for external infrastructure.

Source Code Review

Autonomous source code analysis that finds vulnerabilities directly in your GitHub repository.

Ready to try autonomous pentesting?

See how Revaizor can transform your security testing.

Request Early Access