June 2018
Intermediate to advanced
294 pages
7h 5m
English
|
Threat Description |
Threat aimed at gaining privileged access to resources, for gaining unauthorized access to information or to compromise a system. |
|
Threat Target |
Network Infrastructure. |
|
Attacker Steps |
After getting authenticated into the system, an attacker can upload a remote shell to manipulate the server remotely. If there are any missing configurations or patches, the hacker can take advantage of the flaw and escalate his/her privileges. |
|
Counter-measure |
|
|
Existing Counter-measure |
|