G-Systems
Distinguished
[citation][nom]gzhang[/nom]There is a legit reason why this is a hack. Consider a university or library computer system that can be accessed by many people and the admin only want to give guest access to all users. Now with this hack, the low privilege user could gain higher privileges and by pass security, and will be able to do what ever they want (make the machine as a spam hub etc)[/citation]
I thumbed you up although I don't completely agree with your assessment. Network Administrators--especially those in the positions that you mention--could easily usurp this type of attack...or atleast limit its effects on the rest of the network. It's just not that big of a deal. In the cases where it could affect a computer, the situation needed would warrant any other type of data breach with physical access.
On a cloud-based network, the attack would do minimal if any damage to the other connected computers...
I like the fact that you pursued another line of thought instead of, "Duh..." (like I did lol), but it's not a security problem at all and Tom's should be ashamed of implying it...
Happy Posting!!
I thumbed you up although I don't completely agree with your assessment. Network Administrators--especially those in the positions that you mention--could easily usurp this type of attack...or atleast limit its effects on the rest of the network. It's just not that big of a deal. In the cases where it could affect a computer, the situation needed would warrant any other type of data breach with physical access.
On a cloud-based network, the attack would do minimal if any damage to the other connected computers...
I like the fact that you pursued another line of thought instead of, "Duh..." (like I did lol), but it's not a security problem at all and Tom's should be ashamed of implying it...
Happy Posting!!