An attacker has performed a privilege escalation attack on your system. Which of the following is most likely the goal behind this attack?
1) To gain unauthorized access to sensitive information
2) To disrupt the normal functioning of the system
3) To steal personal data of users
4) To test the security vulnerabilities of the system