header bg

Question:

How can the white hat hacker achieve in the case that he gains control over a user account and attempts to acquire access to another account's confidential files and information in an internal security audit?

A Privilege Escalation
Explaination