passwords How I Compromised Your Complex Password from The Internet One of an attacker’s first goals is to gain a foothold in a target environment. The role or permissions of an end user does not matter if it can be leveraged to gain access.