An attacker has gained access to the company’s web server by using the administrator’s
credentials. The attacker then begins to work on compromising the sensitive data on other
servers. Which off the following BEST describes this type of attack?

A.
Privilege escalation
B.
Client-side attack
C.
Man-in-the-middle
D.
Transitive access
Shouldn’t it be this one?
Privelege escalation: happens when one user acquires the system rights of another user. Network intruders have many techniques for increasing privileges …
0
0