ethical-hacker video for an attacker gains initial access to a system with user-level privileges. What should be their next step to escalate privileges using a
An attacker gains initial access to a system with user-level privileges. What should be their next step to escalate privileges using a service exploit?