Module 5 - System Hacking

Description

CEH Hacking Etico Flashcards on Module 5 - System Hacking, created by Carla Torres8499 on 13/07/2016.
Carla Torres8499
Flashcards by Carla Torres8499, updated more than 1 year ago
Carla Torres8499
Created by Carla Torres8499 almost 8 years ago
2
0

Resource summary

Question Answer
System Hacking The attacker attacks the target system using the information acquired in footprinting, scanning and enumeration.
Gaining access To bypass access controls to gain access to the system using information obtained previously
Escalating privileges Using a low-privileged normal user accounts, attacker tries to increase the administrator privileges to performe protected operations
Executing applications Attacker attempts to install malicious programs (Trojans, Backdoors, Keyloggers, etc.) and having remote system access
Hiding files The attacker tries to hide the malicious code that has been installed and thus its activities
Covering tracks To remain undetected, attacker tries to erase all evidence of security compromise from the system
Show full summary Hide full summary

Similar

Personal Introduction
Claudia Elena Ur
Greetings Course One
Jenny Contreras
Material Development
Rafael Solorzano
ME (name, surname and picture)
verogriecco
Pre-Writing exercise: Introduction of Research Topic
Solmarie Morales
ELECTROTERAPIA
laetitia chabre
Introduction to Chemistry
Daniel López
passé composé
adriana bruno
Introductions
María Vera
Personal Introduction
María Vera
Introductions
María Vera