GATHERING TARGET INFORMATION

Get Started. It's Free
or sign up with your email address
GATHERING TARGET INFORMATION by Mind Map: GATHERING TARGET INFORMATION

1. Types of Password Attack

1.1. Offline attacks

1.2. Active online

1.3. Passive Online

1.4. Nontechnical attacks

2. Step manual password cracking

2.1. Find a valid user

2.2. Create a list of possible passwords

2.3. Rank the passwords from high probability to low

2.4. Key in each password

2.5. If the system rejects the password,try again

3. Privilege Escalation

3.1. Active@ Password Changer

3.2. Privilege Escalation Tool: X.exe

3.3. Login Hack

4. Steganoghraphy

4.1. the art of hiding data behind some other data.It replaces bits of unused data in graphic, sound, text,audio, or video files with other data.hidden data can be plaintext or ciphertext, or it can be an image

5. SYSTEM HACKING

5.1. the way hackers get access to individual computers on a network. ... This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks

6. System Hacking Steps

6.1. Cracking Password

6.2. Escalating Privileges

6.3. executing app

6.4. testing

6.5. covering tacks

6.6. hiding files

7. Rootkits

7.1. to allow an attacker repeated, unregulated, and undetected access to a compromised system