Hacking
Was ist Hacken?
Arten von Vulnerabilities / Exploits
flowchart LR
subgraph CodeExecution
ArbitraryCodeExecution
RemoteCodeExecution
end
subgraph RootAccess
PrivilegeEscalation --> Backdoor --> Rootkit
end
CodeExecution --> PrivilegeEscalation