When exploiting a system, what determines the privileges that you will have when the system is exploited?

Posted Date: