Summary
In this chapter, we saw many techniques for getting more information, constraining, and even evicting other users from the same system. Whether it's the administrator or an attacker, all of these techniques can be very helpful for understanding who is doing what on the system and getting control from them. Further, we saw many ways we can both spy on other users of the system and kick them out of a system altogether. In the event you need to let someone access the system, we also saw several techniques for restricting their access and removing privileges. This chapter was all about turning the tide on another user of the system, stealing operational information from them, and maintaining a position of power over the opponent.