Module 5 - System Hacking

Descripción

CEH Hacking Etico Fichas sobre Module 5 - System Hacking, creado por Carla Torres8499 el 13/07/2016.
Carla Torres8499
Fichas por Carla Torres8499, actualizado hace más de 1 año
Carla Torres8499
Creado por Carla Torres8499 hace casi 8 años
2
0

Resumen del Recurso

Pregunta Respuesta
System Hacking The attacker attacks the target system using the information acquired in footprinting, scanning and enumeration.
Gaining access To bypass access controls to gain access to the system using information obtained previously
Escalating privileges Using a low-privileged normal user accounts, attacker tries to increase the administrator privileges to performe protected operations
Executing applications Attacker attempts to install malicious programs (Trojans, Backdoors, Keyloggers, etc.) and having remote system access
Hiding files The attacker tries to hide the malicious code that has been installed and thus its activities
Covering tracks To remain undetected, attacker tries to erase all evidence of security compromise from the system
Mostrar resumen completo Ocultar resumen completo

Similar

Personal Introduction
Claudia Elena Ur
Greetings Course One
Jenny Contreras
Material Development
Rafael Solorzano
ME (name, surname and picture)
verogriecco
Pre-Writing exercise: Introduction of Research Topic
Solmarie Morales
ELECTROTERAPIA
laetitia chabre
Introduction to Chemistry
Daniel López
passé composé
adriana bruno
Introductions
María Vera
Personal Introduction
María Vera
Introductions
María Vera