Privilege Escalation Detection in Logs

AttackPatterns Multi-Platform Privilege Escalation

What This Means

Detect privilege escalation attacks in Windows and Linux logs. Identify unauthorized elevation from standard user to admin, token manipulation, and exploitation of misconfigurations.

Example Log

-- Windows privilege escalation indicators:
[4672] Special privileges assigned to jsmith (unexpected — not an admin)
[4688] jsmith ran: cmd.exe /c "net localgroup Administrators jsmith /add"
[4732] jsmith was added to Administrators group by jsmith
[4688] jsmith ran: powershell.exe -c "Set-MpPreference -DisableRealtimeMonitoring $true"

-- Linux privilege escalation:
jsmith : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/bash
kernel: jsmith[12345] used exploit CVE-2021-4034 to gain root

Indicators of Suspicious Activity

How to Investigate

  1. Determine the initial privilege level of the account before escalation
  2. Identify the escalation method (group modification, exploit, token manipulation, sudo abuse)
  3. Check what actions were performed with the elevated privileges
  4. Assess whether the escalation was authorized (emergency admin task) or unauthorized
  5. Review for other compromised accounts that may have been used in the chain
  6. Check for persistence mechanisms installed with elevated privileges

Recommended Mitigations

Scan This Log Instantly

Paste a suspicious log line below and get an instant AI-powered security assessment.

0 / 2000

Need a Full Investigation?

Scan entire log files, detect attack patterns, reconstruct timelines, and generate a full investigation report.

Run Smart Scan

Related Attack Patterns

Frequently Asked Questions

What is privilege escalation?
Privilege escalation is when an attacker gains higher-level permissions than they are authorized for. Vertical escalation goes from user to admin. Horizontal escalation accesses another users resources at the same privilege level.
What are common Windows privilege escalation techniques?
Common techniques: UAC bypass (fodhelper, eventvwr), token manipulation (SeImpersonatePrivilege abuse), unquoted service paths, DLL hijacking, always-install-elevated MSI, and kernel exploits.
How do I detect privilege escalation in real-time?
Monitor Event 4672 (privilege assignment) for non-admin accounts, Event 4732 (group membership changes) for privilege groups, and Event 4688 (process creation) for known escalation tool signatures. EDR provides the deepest detection.