Privilege Escalation Attack & Defense Explained | BeyondTrust