However, our aim is to get authorized access to the system using their own set credential for phpMyAdmin. Firstly, we use their credentials since if the logs are monitored it will display logins from the authorized accounts. Secondly, creating another user may indicate a red flag and will lead to identifying the system that has already been compromised. Hiding our anonymity this way would lead them to consider that the credentials had been compromised and they may change their password at most. Which hides our way into the system.
Do drop in your comments... do share, like and subscribe.
0 Comments