Step 5 - Privilege Escalation

Once established as a trusted user, the hacker moves their permissions from a user to give themselves administrative privileges over the network.

All computers, printers and devices are fully exposed and vulnerable to the hacker. This is known as 'owning the network'.

Protection: Check user rights regularly.