Which of the following techniques is commonly employed to escalate privileges on a target system?
Buffer overflow
Cross-site scripting
Overlook minor misbehaviors
Impose harsh punishments for any infraction

Network Ethical Hacking Exercises are loading ...