Hacking framework
Initial access
physical access
brute force
trojans
Privilege escalation
Administrator, root privileges
Consolidation of power
other accounts and resources
Covering tracks
avoid detection
Previous slide
Next slide
Back to first slide
View graphic version