Can demonstrate how a poorly configured NFS service can lead to the compromise of a server, allow a user to escalate privileges and/or gainfurther access to a host, e.g. through the creation of SUID-root files, the modification of files and file system permissions, and UID/GID manipulation