Ethical Hacking: System Hacking
Overview
Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools.
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools.
These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
Syllabus
Introduction
- Welcome
- What you should know
- Hacking ethically
- Setting the stage
- Hacking goals
- Authenticate a user
- Acquire passwords
- Password cracking techniques
- Generate rainbow tables
- Defend against password attacks
- Privilege escalation overview
- Escalating privileges
- Executing applications
- Defend against privilege escalation
- Spyware overview
- Spyware types
- Capture screen activity
- Spyware on a cell phone
- Defend against spyware
- Compare keystroke loggers
- Keylogging with Actual Spy
- Methodology of keystroke logging
- Keystroke loggers for macOS
- Protect against keylogging
- Swimming in the NTFS data stream
- Using steganography
- Understanding steganography
- Using whitespace steganography
- Hide a message with steganography
- Detect steganography
- Disable logging and hide files
- How to cover your tracks
- Next steps
Taught by
Lisa Bock