Implementing a Method for Privilege Escalation Attacks in Windows Systems

Yükleniyor...
Küçük Resim

Tarih

Dergi Başlığı

Dergi ISSN

Cilt Başlığı

Yayıncı

IEEE

Erişim Hakkı

info:eu-repo/semantics/embargoedAccess

Özet

Nowadays, the security of digital data is one of the most important assets of the information age and is more important than ever. Many operating system services require special privileges to conduct their tasks. A configuration or programming error made in a privileged service in the operating system or software causes unauthorized access to privileges. Especially in widely used operating systems such as Windows, privilege escalation attacks are one of the main threats to system security. In a worst-case scenario, these attacks open the door for a remote attacker to take action that requires high-level privilege, allowing them to switch from limited user rights to administrator rights that provide full control over the system by exploiting vulnerabilities or programming errors in the system. This study provides a perspective on how privilege escalation attacks occur in Windows operating systems, how privilege escalation attacks occur by cracking user password hashes in the Security Account Manager (SAM) file, and how privilege separation can be an effective defense method against such attacks.

Açıklama

Anahtar Kelimeler

Privilege Escalation, Information Security, Malware Attack, Cyber Security

Kaynak

7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA)

WoS Q Değeri

Scopus Q Değeri

Cilt

Sayı

Künye

ÇALIK, Esra Bayazıt, Merve ARAÇ. "Implementing a Method for Privilege Escalation Attacks in Windows Systems". 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA), 2025.

Onay

İnceleme

Ekleyen

Referans Veren