Which of the following are examples of privilege escalation? Each correct answer represents a complete solution. Choose two.
A.
John uses SQL commands to login to a website hedoes not have authorization to
B.
Juan logs in with his account, then takes over Anita’s privileges
C.
John logs in as a standard user but uses a flaw in the system to get admin privilege
D.
Fred uses Ophcrack to get a Windows XP password
Explanation:
In both cases the user had some authentic access, but then got additional privileges they had not been authorized.Answer option C is incorrect. This is an example of SQL injection.
Answer option D is incorrect. This is an example of password cracking.
One of our guests not long ago encouraged the following website.