My Image

Step 5 - Privilege Escalation

Once established as a trusted user, the hacker moves their permissions from a user to give themselves administrative privileges over the network.

All computers, printers and devices are fully exposed and vulnerable to the hacker. This is known as 'owning the network'.

Protection: Check user rights regularly.

Steve Mac Media Limited - 7592963

Trading Address & Registered Office: 90-92 King Street, Maidstone, Kent, ME14 1BH