Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Authorization has to be granted to specific users in order to perform tasks that can be considered of higher risk. An adversary can perform several methods to take advantage of built-in control mechanisms in order to escalate privileges on a system.
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
alerts_for_windows_machines | Alerts for Windows Machines | technique_scores | T1548 | Abuse Elevation Control Mechanism |
Comments
The only sub-technique scored (Bypass User Account Control) is the only one relevant to Windows.
References
|
azure_sentinel | Azure Sentinel | technique_scores | T1548 | Abuse Elevation Control Mechanism |
Comments
This control can identify one of this technique's sub-techniques when executed via "Powershell Empire cmdlets seen in command line", but does not address other procedures.
References
|
file_integrity_monitoring | File Integrity Monitoring | technique_scores | T1548 | Abuse Elevation Control Mechanism | |
docker_host_hardening | Docker Host Hardening | technique_scores | T1548 | Abuse Elevation Control Mechanism |
Comments
This control is only relevant for Linux endpoints containing Docker containers.
References
|
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1548.002 | Bypass User Account Control | 15 |
T1548.004 | Elevated Execution with Prompt | 11 |
T1548.001 | Setuid and Setgid | 4 |
T1548.003 | Sudo and Sudo Caching | 14 |