RE: What a hacker might do once he took over a server 09-26-2013, 03:14 PM
#2
There's a lot that can be done with a compromised system for one it's an an anchor point into into the network meaning it can be used to locate and attack other systems, bypassing the router's firewall as it comes from inside the network and therefore trusted. There's also the ability to upload or download files view and modify configuration files you could also add it to a botnet or whatever else you want a rooted machine becomes your machine in a a sense.
If you need help feel free to PM me
![[Image: klfpJD]](http://goo.gl/klfpJD)
Probitcoin
Freebitcoin
BTC clicks
bitcoin wallet:
1FBPAanbs3rJU9BUpobpDJc9hHUaCaC25N
Probitcoin
Freebitcoin
BTC clicks
bitcoin wallet:
1FBPAanbs3rJU9BUpobpDJc9hHUaCaC25N