R2L
R2L, short for remote-to-local, is a term used in cybersecurity to describe a class of attacks in which an attacker who does not have a valid local account on the target system attempts to gain local access. The attacker operates from a remote location and seeks to exploit vulnerabilities or misconfigurations to obtain a legitimate local account or higher privileges on the target machine.
R2L attacks typically rely on weaknesses in remote services or authentication mechanisms. Common methods include attempting
In security research and defense, R2L is one of several broad attack categories used to classify intrusion
Defensive measures against R2L include disabling or hardening unused remote services, enforcing strong authentication and multifactor