Ethical Hacking: System Hacking
Pluralsight
Course Summary
You've done your homework; now it's time to totally and completely "pwn" your target and yet make no one the wiser that you've made it in. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Description
This is what it all comes down to. After we've done our research, we've found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of this box. In turn, we then use this box to repeat our efforts to pwn more boxes within the network as well as grab any intellectual property that could be of great worth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
-
+
Course Syllabus
Understanding This Stage- 10m 43s
—Understanding This Stage 2m 11s
—Now, How Exactly Did We Get Here? 2m 26s
—What Are Our Goals? 1m 45s
—The Three Goals and Five Phases 3m 19s
—Summary 1m 0sPhase 1: Gaining Access – Cracking Passwords- 48m 26s
—Phase 1: Gaining Access 3m 12s
—What's Cracking? 7m 13s
—Complexity 8m 14s
—The Architecture 8m 26s
—Techniques Used 6m 29s
—Types of Attacks 6m 6s
—The Hash 5m 44s
—Summary 2m 58sMore Cracking- 39m 17sPhase 2: Gaining Access – Escalating Privileges- 24m 0sPhase 3: Maintaining Access – Executing Applications- 32m 39sPhase 4: Maintaining Access – Hiding Your Tools- 24m 35sPhase 5: Covering Your Tracks - Clearing Logs and Evidence- 19m 1s