As I wrote in this article is often trivial to become local admin on MS system if there isn’t a strong and clear security policy, but it’s also the same in a Unix environment. What is the next step? If an attacker becomes local admin of a company’s PC the next step is to become… (read more)