Chapter 7
Phase3:  Gaining Access Using Application and Operating System Attacks