Which of the following types of attacks precedes the installation of a rootkit on a server?