Which of the following specifically describes the exploitation of an interactive process to access otherwise
restricted areas of the OS?
A.
Privilege escalation
B.
Pivoting
C.
Process affinityD. Buffer overflow
Which of the following specifically describes the exploitation of an interactive process to access otherwise
restricted areas of the OS?
Which of the following specifically describes the exploitation of an interactive process to access otherwise
restricted areas of the OS?
A.
Privilege escalation
B.
Pivoting
C.
Process affinityD. Buffer overflow