Detect privilege escalation attacks in Windows and Linux logs. Identify unauthorized elevation from standard user to admin, token manipulation, and exploitation of misconfigurations.
-- Windows privilege escalation indicators: [4672] Special privileges assigned to jsmith (unexpected — not an admin) [4688] jsmith ran: cmd.exe /c "net localgroup Administrators jsmith /add" [4732] jsmith was added to Administrators group by jsmith [4688] jsmith ran: powershell.exe -c "Set-MpPreference -DisableRealtimeMonitoring $true" -- Linux privilege escalation: jsmith : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/bash kernel: jsmith[12345] used exploit CVE-2021-4034 to gain root