Every second matters in a privilege escalation incident response. Attackers rarely stop after gaining higher access. They pivot, exfiltrate, and plant persistence mechanisms. If detection is late, the cost rises fast.
Step one: identify the entry point. Review authentication logs. Check recent sudo or role changes. Inspect the privilege chain: which accounts jumped levels, when, and from where.
Step two: contain. Disable compromised accounts. Terminate active sessions. Lock down vulnerable services. Segment the network to isolate the affected system immediately.
Step three: gather evidence. Export system logs. Capture running processes. Record network connections. Include timestamps and hash values for any collected files. Forensic integrity is critical for post-incident analysis and potential legal requirements.