From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Hacking goals

Hacking goals

From the course: Ethical Hacking: System Hacking

Start my 1-month free trial

Hacking goals

- [Voiceover] After scanning the network, and obtaining a blueprint, gaining access is next. In order to gain access to a system, we'll most likely need a password. Obtaining the password can be an active online attack with methods such as dictionary, brute force, or keylogger attack. Or it can be a passive online attack that includes packet sniffing, man in the middle, and replay attacks. If a password list is obtained, we may have to do an offline evaluation, such as a rainbow attack. Once in the system, the key is to maintain access, and continually escalate until you reach the administrator level. The key is to be careful in this phase, as the longer access is maintained, the better chance of getting caught. The next step is escalating privilege in order to achieve access to resources normally restricted from an end-user or application. Look around and see if there are any unmounted file systems or development tools available. With the knowledge of the vulnerabilities, and what is…

Contents