If the intruder achieves access, the next step may be accessing the company's resources for financial gain.

The hacker may try to:

  • Install a password cracking tool.
  • Turn the server into a free software site for other intruders.
  • Change the root (administrator) password, initiating a DOS attack.

The hacker may later inform the site owners that their network has been compromised, tell them how it was done, and allow them to patch the holes.