From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Hacking goals
- [Voiceover] After scanning the network, and obtaining a blueprint, gaining access is next. In order to gain access to a system, we'll most likely need a password. Obtaining the password can be an active online attack with methods such as dictionary, brute force, or keylogger attack. Or it can be a passive online attack that includes packet sniffing, man in the middle, and replay attacks. If a password list is obtained, we may have to do an offline evaluation, such as a rainbow attack. Once in the system, the key is to maintain access, and continually escalate until you reach the administrator level. The key is to be careful in this phase, as the longer access is maintained, the better chance of getting caught. The next step is escalating privilege in order to achieve access to resources normally restricted from an end-user or application. Look around and see if there are any unmounted file systems or development tools available. With the knowledge of the vulnerabilities, and what is…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.