Ethical Hacking: System Hacking
Год выпуска: 2015
Производитель: Pluralsight
Сайт производителя: pluralsight.com
Автор: Dale Meredith
Продолжительность: 3:18
Тип раздаваемого материала: Видеоклипы
Язык: Английский
Описание: This is what it all comes down to. After we've done our research, we've found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of this box. In turn, we then use this box to repeat our efforts to pwn more boxes within the network as well as grab any intellectual property that could be of great worth. This course is part of the Ethical Hacking Series.
http://blog.pluralsight.com/learning-path-ethical-hackingUnderstanding This Stage
Understanding This Stage
Now, How Exactly Did We Get Here?
What Are Our Goals?
The Three Goals and Five Phases
Summary
Phase 1: Gaining Access – Cracking Passwords
Phase 1: Gaining Access
What's Cracking?
Complexity
The Architecture
Techniques Used
Types of Attacks
The Hash
Summary
More Cracking
More Cracking
NTLM Authentication
Kerberos Authentication
Salting
Rainbow Tables and Other Options
DEMO: Cain & Abel / John the Ripper
Summary
Phase 2: Gaining Access – Escalating Privileges
Escalating Privileges
So We've Made It In. Now What?
Types of Escalation
Countermeasures
Summary
Phase 3: Maintaining Access – Executing Applications
Total Pwned
Goals
Spyware & Backdoors
More About Backdoors
Keyloggers
Summary
Phase 4: Maintaining Access – Hiding Your Tools
Hiding Your Tools
Rootkits
Alternate Data Streams
Steganography
Summary
Phase 5: Covering Your Tracks - Clearing Logs and Evidence
Clearing Logs and Evidence
Why Do We Cover Our Tracks?
Basic Method
Advanced Method
Summary
Файлы примеров: присутствуют
Формат видео: MP4
Видео: AVC, 1024x576, 16:9, 15fps, 366kbps
Аудио: AAC, 44.1kHz, 192kbps, stereo