Things Attackers do after
Stack is Smashed
¨Force exploit code to spawn a command shell and enter another command to be executed by command shell ¨Shell and command will run under the context of the vulnerable process
¨Installing a backdoor using inetd
¨Backdooring with TFTP and Netcat
¨Shooting back an Xterm