These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Acquiring passwords
- Generating rainbow tables
- Understanding where passwords are stored
- Defending against privilege escalation
- Understanding spyware
- Protecting against keylogging
- Detecting steganography
- How hackers cover their tracks
Skill Level Intermediate
- [Voiceover] Do you ever wonder how easy it might be to obtain a password and get into your system? Once in the system, what can malicious parties do? Could they escalate their privileges to the administrator level? Hi, my name is Lisa Bock, and I'm a security ambassador. In this course, I'll explore the third phase of ethical hacking, system hacking, an important phase for many reasons. After scanning target systems, the ethical hacker is then armed with more information, and has a better idea of how malicious parties might get deeper into a system.
In this course, I'll go over methods to obtain a password, then once obtained, ways to escalate your privileges and execute applications. I'll cover spyware, capturing screen activity, and keystroke loggers. I'll review ways of hiding in plain sight using alternate data streams and steganography. Finally, I'll discuss ways to cover your tracks. This course is part of the Ethical Hacking series. Are you ready? Let's get started.