BYU logo Computer Science
CS 465 Introduction to Security and Privacy

Defenses and Privilege escalation

Ungraded Quiz

  • explain how a stack canary works
  • why does ASLR make it harder to run a simple stack-based buffer overflow attack?
  • explain a simple example of how privilege escalation can work

Key Concepts

Buffer overflow defenses

Adoption Barriers

  • no governing body
  • backwards compatibility
  • incomplete solutions

Privilege escalation

  • may be able to break into a low-privilege account first, then need to try to gain higher privileges
    • from a fixed program to a shell
    • from a sandbox to a complete system
    • from non-root to root
    • from root to kernel
  • see simple example, page 175
  • some ports are privileged, so the programs given access to those ports are targets for an attacker
  • follow best practices! don’t use root accounts, don’t put untested programs on privileged ports
  • privilege escalation CVEs

Extra Reading