My Image

Step 5 - Privilege Escalation

Once established as a trusted user, the hacker moves their permissions from a user to give themselves administrative privileges over the network.

All computers, printers and devices are fully exposed and vulnerable to the hacker. This is known as 'owning the network'.

Protection: Check user rights regularly.


Steve Mac Media Limited - 7592963
Trading Address: Marne House, 24 Mount Ephraim Road, Tunbridge Wells, Kent TN1 1ED
Registered Office: 90-92 King Street, Maidstone, Kent, ME14 1BH