Chapter 7
Phase3:
Gaining Access Using
Application and Operating
System Attacks