Step 5 - Privilege Escalation
Once established as a trusted user, the hacker moves their permissions from a user to give themselves administrative privileges over the network.
All computers, printers and devices are fully exposed and vulnerable to the hacker. This is known as 'owning the network'.
Protection: Check user rights regularly.