Step 5 - Privilege Escalation
Once established as a trusted user, the hacker moves their permissions from a user to give themselves administrative privileges over the network.
All computers, printers and devices are fully exposed and vulnerable to the hacker. This is known as 'owning the network'.
Protection: Check user rights regularly.
Steve Mac Media Limited - 7592963
Trading Address & Registered Office: 90-92 King Street, Maidstone, Kent, ME14 1BH