而通常它所需要的只是访问数据的权限(并且希望看到自己的竞争对手没有取得相应的权限)。
Usually all it wants is to have access to them (and see that its rivals do not).
一旦攻击者成功地取得了适当的权限,其之后的动作对于用户来说就不可见的了。
In case the attacker succeeded in getting the proper privileges, further actions will be transparent to the user.
其时用户权限不行致使,处理方法取得更高权限。
When user permissions not causes, treatment methods to obtain the higher authority.
应用推荐