John, a security analyst, is analyzing a server suspected of being compromised. The attacker has used a non admin account and has already gained a foothold on the system. John discovers that a new Dynamic Link Library is loaded in the application directory of the affected server. This DLL does not have a fully qualified path and seems to be malicious. What privilege escalation technique has the attacker likely used to compromise this server?
ethacker2
7 months, 1 week agoqwerty100
7 months, 3 weeks ago[Removed]
7 months, 3 weeks agoDarioReymag
7 months, 4 weeks ago