Anatomy of a Hacker Attack
Phase 4 - Elevating Privileges
Normally, important information is protected so that only
certain users can access it. For the hacker, this is usually not much of a
problem. If he can execute code on the target system, there are a number of
known security holes that can be exploited to elevate privileges, i.e. gain
access to an administrative account. These range from bugs in operating system
components to being able to replace system files or tricking the system into
executing the wrong files. It is very unlikely that all of these holes are
plugged on an individual system.
Copyright © 2002 Abtrusion Security AB.
All rights reserved. This document may be reproduced provided that it is
reproduced in its entirety and that this copyright message is retained.