Just leave your tools here. So when you want to come back and attack me again, it will be much easier.

Many times, when a computer is successfully compromised, a hacker will attempt to elevate his privileges to obtain administrator- or root user–level access. Working in the security context of these types of privileged users allows the attacker to carry out more dangerous activities. Once the level of access is achieved, the attacker can upload a bundle of tools, collectively called a rootkit. The first thing that is usually installed is a backdoor program, which allows the attacker to enter the system at any time without having to go through any authentication steps. (A backdoor is just a service that listens on a specific port.) The ...

Get CISSP Certification All-in-One Exam Guide, Fourth Edition, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.