Privilege Escalation (13 techniques)
Gaining higher-level permissions on a system or network.
The Privilege Escalation tactic groups MITRE ATT&CK techniques used by adversaries to gaining higher-level permissions on a system or network. Each technique below has its own page with detection guidance, platforms, and sub-techniques.
- T1037 — Boot or Logon Initialization Scripts ESXi, Linux, macOS, Network Devices, Windows
- T1053 — Scheduled Task/Job Containers, ESXi, Linux, macOS, Network Devices, Windows
- T1055 — Process Injection Linux, macOS, Windows
- T1068 — Exploitation for Privilege Escalation Containers, Linux, macOS, Windows
- T1078 — Valid Accounts Containers, ESXi, IaaS, Identity Provider, Linux, macOS, Network Devices, Office Suite, SaaS, Windows
- T1098 — Account Manipulation Containers, ESXi, IaaS, Identity Provider, Linux, macOS, Network Devices, Office Suite, SaaS, Windows
- T1134 — Access Token Manipulation Windows
- T1484 — Domain or Tenant Policy Modification Windows, Identity Provider
- T1543 — Create or Modify System Process Containers, Linux, macOS, Windows
- T1546 — Event Triggered Execution Linux, macOS, Windows, SaaS, IaaS, Office Suite
- T1547 — Boot or Logon Autostart Execution Linux, macOS, Windows, Network Devices
- T1548 — Abuse Elevation Control Mechanism Linux, macOS, Windows, IaaS, Office Suite, Identity Provider
- T1611 — Escape to Host Windows, Linux, Containers, ESXi
Detection engineering training, taught by practitioners.
Learn how to build real detections across the MITRE ATT&CK framework.
View Courses