You work as the security administrator at TestKing.com. One morning you discover thata user named Mia Hamm has used her user account to log on to a network server. Mia has then executed a program and been able to perform operations which only a network administrator or security administrator should be able to. What type of attack has occurred?
Privilege escalation attack