# Administrator rights Large amount of data breaches involves the use of privileged credentials. The best practice is to assign permissions necessary for the specific user. ## Administrative account allows: - Installation of unneccessary software. - Executing potentially malicious programs - Changing Operating system settings intentionally or unintentionally. ## Example scenario Examples scenario is shown below. Screen capture from Win10(users machine) and Linux(scammers machine) are shown in the pictures. - Win10 user downloads legimitate looking program from unknown source and proceeds to install it. Linux machine in the left is listening for incoming connections (Picture 1 & Picture 2.) ![](https://i.imgur.com/aXL0SXx.jpg) #### Picture 1 ![](https://i.imgur.com/CbqqBs0.jpg) #### Picture 2 - Now the installation is completed and the program can be run (Picture 3). ![](https://i.imgur.com/2OYA5tJ.jpg) #### Picture 3 - As shown in the picture 4, the installation process also executed a reverse https connection to the Linux machine allowing the Linux user access to the Win10 computer. ![](https://i.imgur.com/crnt1MH.jpg) #### Picture 4