Loading previews...
Summary: | The goal of most remote hacks is to authenticate to the target with the highest level of access and permission possible. Later remove evidence of the attack. To hack a target system, an attacker often has to establish the password associated with active usernames, escalate level of permission and erase traces that they were there. To achieve this successfully, an attacker has to be able to: • Employ various password cracking techniques and tools, • Escalate privileges, • Hide files, cover tracks, and erase evidence, • Maintain access (often via a rootkit). Once a hacker has access to a system the next step is to perform some activity. This means executing applications. However, this requires an attacker to gain root or administrative level access to gain full control of the system. |
---|---|
Creators: | |
Divisions: | Academic > School of Computing, Engineering and Built Environment > Department of Computing |
Copyright holder: | Copyright © Glasgow Caledonian University |
Viewing permissions: | World |
Depositing User: | |
Date Deposited: | 12 Nov 2018 11:29 |
Last Modified: | 13 Feb 2020 12:02 |
URI: | https://edshare.gcu.ac.uk/id/eprint/4268 |
Actions (login required)
View Item |
Toolbox
There are no actions available for this resource.