John, a security analyst, is analyzing a server suspected of being compromised. The attacker has used a non admin account and has already gained a foothold on the system. John discovers that a new Dynamic Link Library is loaded in the application directory of the affected server. This DLL does not have a fully qualified path and seems to be malicious. What privilege escalation technique has the attacker likely used to compromise this server?
ethacker2
8 months, 4 weeks agoqwerty100
9 months, 2 weeks ago[Removed]
9 months, 2 weeks agoDarioReymag
9 months, 2 weeks ago