Начать. Это бесплатно
или регистрация c помощью Вашего email-адреса
GATHERING TARGET INFORMATION создатель Mind Map: GATHERING TARGET INFORMATION

1. Types of Password Attack

1.1. Offline attacks

1.2. Active online

1.3. Passive Online

1.4. Nontechnical attacks

2. Step manual password cracking

2.1. Find a valid user

2.2. Create a list of possible passwords

2.3. Rank the passwords from high probability to low

2.4. Key in each password

2.5. If the system rejects the password,try again

3. Privilege Escalation

3.1. Active@ Password Changer

3.2. Privilege Escalation Tool: X.exe

3.3. Login Hack

4. Steganoghraphy

4.1. the art of hiding data behind some other data.It replaces bits of unused data in graphic, sound, text,audio, or video files with other data.hidden data can be plaintext or ciphertext, or it can be an image

5. SYSTEM HACKING

5.1. the way hackers get access to individual computers on a network. ... This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks

6. System Hacking Steps

6.1. Cracking Password

6.2. Escalating Privileges

6.3. executing app

6.4. testing

6.5. covering tacks

6.6. hiding files

7. Rootkits

7.1. to allow an attacker repeated, unregulated, and undetected access to a compromised system