Which of the following is an attacker MOST likely to target to gain privileged access to a system?

A.
Programs that write to system resources
B.
Programs that write to user directories
C.
Log files containing sensitive information
D.
Log files containing system calls
What does A mean?
0
0
If attacker can alter system resources, it means he can take control of Kernel – the most protected stuff. From there he can do anything. It is like hitting jackpot with one dollar lottery ticket. So yeah why not?
0
0