Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking: System Hacking

Description

Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.

Tags

Syllabus

Introduction
  • Welcome
  • What you should know
  • Hacking ethically
1. Understanding System Hacking
  • Setting the stage
  • Hacking goals
  • Authenticate a user
  • Challenge: Reviewing Azure authentication methods
  • Challenge: Reviewing Azure authentication methods
2. Gaining Access
  • Acquiring passwords
  • Password cracking techniques
  • Generating rainbow tables
  • Defend against password attacks
3. Escalating Priveleges
  • Privilege escalation overview
  • Obtaining administrator privileges
  • Executing applications
  • Defending against privilege escalation
4. Recognizing Spyware
  • Spyware overview
  • Spyware types
  • Capturing screen activity
  • Spyware on a cell phone
  • Defend against spyware
5. Grasping Keyloggers
  • Compare keystroke loggers
  • Using a keystroke logger
  • Methodology of keystroke logging
  • Keystroke loggers for macOS
  • Protect against keylogging
6. Hiding in Plain Sight
  • Swimming in the NTFS data stream
  • Using steganography
  • Understanding steganography
  • Using whitespace steganography
  • Hide a message with steganography
  • Detecting steganography
7. Covering Your Tracks
  • Disable logging and hide files
  • Outlining ways to cover your tracks
Conclusion
  • Next steps

Online Course


Ethical Hacking: System Hacking

Affiliate notice

Learn to detect, prevent, and counter system hacking, including password cracking, privilege escalation, spyware, and keylogging, and study for the Certified Ethical Hacker exam.

Introduction
  • Welcome
  • What you should know
  • Hacking ethically
1. Understanding System Hacking
  • Setting the stage
  • Hacking goals
  • Authenticate a user
  • Challenge: Reviewing Azure authentication methods
  • Challenge: Reviewing Azure authentication methods
2. Gaining Access
  • Acquiring passwords
  • Password cracking techniques
  • Generating rainbow tables
  • Defend against password attacks
3. Escalating Priveleges
  • Privilege escalation overview
  • Obtaining administrator privileges
  • Executing applications
  • Defending against privilege escalation
4. Recognizing Spyware
  • Spyware overview
  • Spyware types
  • Capturing screen activity
  • Spyware on a cell phone
  • Defend against spyware
5. Grasping Keyloggers
  • Compare keystroke loggers
  • Using a keystroke logger
  • Methodology of keystroke logging
  • Keystroke loggers for macOS
  • Protect against keylogging
6. Hiding in Plain Sight
  • Swimming in the NTFS data stream
  • Using steganography
  • Understanding steganography
  • Using whitespace steganography
  • Hide a message with steganography
  • Detecting steganography
7. Covering Your Tracks
  • Disable logging and hide files
  • Outlining ways to cover your tracks
Conclusion
  • Next steps