What Do They Do (2of 3) ?
Use the host as a program repository to serve other hackers
Attack other hosts from the exploited hosts (e.g., network bombs)
Attack weaknesses in system to obtain root access
Previous slide
Next slide
Back to first slide
View graphic version