First page Back Continue Last page Summary Graphics
Taking control
- Gaining root, admin or privileged access
- Exploit buffer overflow
- Exploit security configuration errors
- Take advantage of Windows NT/2000 registry problems to gain privileged access
- Exploit other O/S or application bugs
- Keep control by inserting backdoor or Trojan horse