- Privilege Escalation
In this , when the user gained access to the target system by any user account , next requirement is to gain access administrative account or to gain higher privilege than that of administrative . This process is known as privilege escalation.
- Executing Applications to maintain access
Once the privilege are successfully escalated , attacker executes applications like backdoor or trojans to maintain his access into the system . This is one of the important phase where attacker needs to be careful , else he might get caught