Ethical Hacking: System Hacking

Ethical Hacking: System Hacking
Ethical Hacking: System Hacking
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 25m | 225 MB

System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools.

Topics include:

  • Acquiring passwords
  • Generating rainbow tables
  • Understanding where passwords are stored
  • Defending against privilege escalation
  • Understanding spyware
  • Protecting against keylogging
  • Detecting steganography
  • How hackers cover their tracks
Table of Contents

Introduction
1 Welcome
2 What you should know
3 Hacking ethically

System Hacking Overview
4 Setting the stage
5 Hacking goals
6 Authenticate a user

Gaining Access
7 Acquire passwords
8 Password cracking techniques
9 Generate rainbow tables
10 Defend against password attacks

Privilege Escalation
11 Privilege escalation overview
12 Escalating privileges
13 Executing applications
14 Defend against privilege escalation

Spyware
15 Spyware overview
16 Spyware types
17 Capture screen activity
18 Spyware on a cell phone
19 Defend against spyware

Keyloggers
20 Compare keystroke loggers
21 Keylogging with Actual Spy
22 Methodology of keystroke logging
23 Keystroke loggers for macOS
24 Protect against keylogging

Hiding in Plain Sight
25 Swimming in the NTFS data stream
26 Using steganography
27 Understanding steganography
28 Using whitespace steganography
29 Hide a message with steganography
30 Detect steganography

Cover Your Tracks
31 Disable logging and hide files
32 How to cover your tracks

Conclusion
33 Next steps