Escalating user privileges on a compromised host