When the attacker breaks into the system by proving to the application that he is a known and valid user, the attacker gains access to whatever privileges the administrator assigned that user.
2. About Cyber Secure Pakistan
CSP’13
• This year theme of the Conference is “Hackers and Threats”
• Pakistan Information Security Association (PISA) in
association with UltraSpectra (Pvt.) Ltd. brings you the
Premium InfoSec Conference
• The mission of Cyber Secure Pakistan Blog is to give
awareness in general to the individuals and organizations
about the Cyber Security
3. Attacker and Vulnerability
• Defining Vulnerabilities
• Common Username/Passwords Used By Attackers
• Custom Tools Attempt
Read More:
http://cybersecurepakistan.com/blog/attacker-and-
vulnerability-csp-13/