GATHERING TARGET INFORMATION

Get Started. It's Free
or sign up with your email address
Rocket clouds
GATHERING TARGET INFORMATION by Mind Map: GATHERING TARGET INFORMATION

1. SYSTEM HACKING

1.1. the way hackers get access to individual computers on a network. ... This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks

2. System Hacking Steps

2.1. Cracking Password

2.2. Escalating Privileges

2.3. executing app

2.4. testing

2.5. covering tacks

2.6. hiding files

3. Types of Password Attack

3.1. Offline attacks

3.2. Active online

3.3. Passive Online

3.4. Nontechnical attacks

4. Step manual password cracking

4.1. Find a valid user

4.2. Create a list of possible passwords

4.3. Rank the passwords from high probability to low

4.4. Key in each password

4.5. If the system rejects the password,try again

5. Privilege Escalation

5.1. [email protected] Password Changer

5.2. Privilege Escalation Tool: X.exe

5.3. Login Hack

6. Rootkits

6.1. to allow an attacker repeated, unregulated, and undetected access to a compromised system

7. Steganoghraphy

7.1. the art of hiding data behind some other data.It replaces bits of unused data in graphic, sound, text,audio, or video files with other data.hidden data can be plaintext or ciphertext, or it can be an image