interactive means input, gain restrict area means modify memory that not allowed to the application, this is buffer overflow. No mention to gain another account(privilege escalation).
Exactly why i chose buffer overflow, when someone does a buffer overflow attack they target a specifc hardware that holds memory, forcely push more memory into that limited area so the extra memory can go to the next area and change the data, leading to expolitation.
The correct answer is C. Privilege escalation. This term refers to the act of exploiting a vulnerability or design flaw in a system to gain elevated access privileges, typically beyond what was originally intended by the system's administrators. This could involve exploiting an interactive process to gain access to restricted areas or functions within a system.
Privilege escalation is the process of exploiting a vulnerability or weakness in a system to gain higher-level access or privileges than the user originally had. It involves elevating one's privileges from a standard or restricted user to an administrative or superuser level. By doing so, an attacker can gain access to sensitive or restricted areas of the system, perform unauthorized actions, and potentially take control over the entire system.
Privilege escalation can occur through various means, such as exploiting software vulnerabilities, misconfigurations, or weaknesses in access controls. It is a critical security concern and is often used as part of sophisticated cyberattacks to gain deeper access to a targeted system or network.
Privilege escalation is the process of elevating one's privileges or access level beyond what is initially granted. In the context of security, it typically refers to gaining higher privileges within a system or application to access restricted areas or perform unauthorized actions.
Exploiting an interactive process refers to taking advantage of a running program or process to manipulate it in a way that grants higher privileges or access rights. By exploiting vulnerabilities or weaknesses in the interactive process, an attacker can escalate their privileges and gain unauthorized access to restricted areas of the system.
I thought it was B at first, but after checking the book C seems to be correct.
"There are a couple of ways to achieve privilege escalation. One way is to use existing privileges to perform an action that steals a better set of credentials. You can obtain “better” credentials by using sniffers to grab credentials or by getting the Windows Security Account Manager (SAM) or the Linux/Unix etc/passwd file. Another method is by exploiting
vulnerabilities or weaknesses in processes that are running with escalated privileges. Injecting malicious code into these processes can also achieve escalated privilege."
-All-in-one Comptia Security+ SY0-601 by Conklin, White, et al
C. Privilege escalation.
Privilege escalation is the exploitation of an interactive process to gain access to resources that are normally unavailable to an unauthorized user. This can occur when an attacker gains access to a low-privileged account on a system and then uses that access to escalate privileges to a higher level, allowing the attacker to perform actions they wouldn't normally be able to do. For example, an attacker might use a privilege escalation exploit to gain administrative access to a system or to gain access to sensitive data.
C. Privilege Escalation seeks to increase the level of access that a user normally doesn't have. A restricted access area is an increased level of access.
With Privilege Escalation, hackers can use a NON-INTERACTIVE program (application) to gain access. Privilege escalation happens when a malicious user exploits a bug, design flaw, or configuration error in an APPLICATION (either a batch program or an interactive program) or OPERATING SYSTEM utility program to gain elevated access to resources that should normally be unavailable to that user.
This section is not available anymore. Please use the main Exam Page.SY0-601 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
varun0
Highly Voted 2 years, 7 months agoNICKJONRIPPER
Highly Voted 2 years, 5 months agorikres25
11 months, 3 weeks agoPropheticBettor
1 year, 6 months agoPropheticBettor
1 year, 6 months agoNICKJONRIPPER
2 years, 5 months agoDutch012
1 year, 11 months agof71cbb0
Most Recent 11 months, 2 weeks agorikres25
11 months, 3 weeks agoAspiringNerd
1 year agorussian
1 year agoProtract8593
1 year, 9 months agoApplebeesWaiter1122
1 year, 10 months agoLeonardSnart
1 year, 11 months agoprincajen
2 years, 1 month agoDALLASCOWBOYS
2 years, 2 months agoxxxdolorxxx
2 years, 3 months agoFMMIR
2 years, 5 months agocomeragh
2 years, 6 months ago