Hacking
Was ist Hacken?
Arten von Vulnerabilities / Exploits
flowchart LR subgraph CodeExecution ArbitraryCodeExecution RemoteCodeExecution end subgraph RootAccess PrivilegeEscalation --> Backdoor --> Rootkit end CodeExecution --> PrivilegeEscalation