Process of System hacking

  1. Privilege Escalation 
    In this , when the user gained access to the target system by any user account , next requirement is to gain access administrative account or to gain higher privilege than that of administrative . This process is known as privilege escalation.
  2. Executing Applications to maintain access
    Once the privilege are successfully escalated , attacker executes applications like backdoor or trojans to maintain his access into the system . This is one of the important phase where attacker needs to be careful , else he might get caught

Leave a Reply

Your email address will not be published. Required fields are marked *