Abtrusion Security Click here to send someone a link to this page Click here to Bookmark this page
home   products   buy   download   support   about   news   links   contact

Abtrusion Security home

Security products

Purchase Abtrusion Protector

Download of security software for Windows

Abtrusion Protector support

About Abtrusion Security

Security related news

Security links


Download Abtrusion Protector


Information for

> Corporate Management

> System Administrators

> Security Professionals

> Software Developers

> Home Users

Anatomy of a Hacker Attack

Phase 4 - Elevating Privileges

Normally, important information is protected so that only certain users can access it. For the hacker, this is usually not much of a problem. If he can execute code on the target system, there are a number of known security holes that can be exploited to elevate privileges, i.e. gain access to an administrative account. These range from bugs in operating system components to being able to replace system files or tricking the system into executing the wrong files. It is very unlikely that all of these holes are plugged on an individual system.


Single-page view

<< Previous            Next >>

Copyright 2002 Abtrusion Security AB. All rights reserved. This document may be reproduced provided that it is reproduced in its entirety and that this copyright message is retained.