Quote:
Originally Posted by Broodjegehaktmetmayo
Ouch
Of course, the question then pops up: how can a contractor get these kinds of access rights? (I know, it happens every day, but it shouldn't happen).
|
A common occurrence in the industry is the use of outdated software, (right ai-danno).. it's very possible this contractor was able to use a local root exploit.