Understands the Berkeley r-services and their associated security attributes and can demonstrate how trust relationships can: • Lead to the compromise of a server • Allow a user to escalate privileges and/or gain further access to a host, e.g. through the use, creation or modification of .rhosts and/or /etc/hosts.equiv files