System Hacking
Gaining access
Escalating privileges
Executing applications
Hiding files
Covering tracks