Module 5 - System Hacking

Beschreibung

CEH Hacking Etico Karteikarten am Module 5 - System Hacking, erstellt von Carla Torres8499 am 13/07/2016.
Carla Torres8499
Karteikarten von Carla Torres8499, aktualisiert more than 1 year ago
Carla Torres8499
Erstellt von Carla Torres8499 vor mehr als 8 Jahre
3
0

Zusammenfassung der Ressource

Frage Antworten
System Hacking The attacker attacks the target system using the information acquired in footprinting, scanning and enumeration.
Gaining access To bypass access controls to gain access to the system using information obtained previously
Escalating privileges Using a low-privileged normal user accounts, attacker tries to increase the administrator privileges to performe protected operations
Executing applications Attacker attempts to install malicious programs (Trojans, Backdoors, Keyloggers, etc.) and having remote system access
Hiding files The attacker tries to hide the malicious code that has been installed and thus its activities
Covering tracks To remain undetected, attacker tries to erase all evidence of security compromise from the system
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Personal Introduction
Claudia Elena Ur
Greetings Course One
Jenny Contreras
Material Development
Rafael Solorzano
ME (name, surname and picture)
verogriecco
Pre-Writing exercise: Introduction of Research Topic
Solmarie Morales
ELECTROTERAPIA
laetitia chabre
Introduction to Chemistry
Daniel López
passé composé
adriana bruno
Introductions
María Vera
Personal Introduction
María Vera
Introductions
María Vera