Cyber Defense and Penetration Testing: Week 9 - Maintaining Access

LoadingLoading previews...
Maintaining Access
HTML Creative Commons: Attribution-Noncommercial-No Derivative Works 4.0
View
    Maintaining Access
    Maintaining Access
    1 file in this resource
    Summary: The goal of most remote hacks is to authenticate to the target with the highest level of access and permission possible. Later remove evidence of the attack. To hack a target system, an attacker often has to establish the password associated with active usernames, escalate level of permission and erase traces that they were there. To achieve this successfully, an attacker has to be able to: • Employ various password cracking techniques and tools, • Escalate privileges, • Hide files, cover tracks, and erase evidence, • Maintain access (often via a rootkit). Once a hacker has access to a system the next step is to perform some activity. This means executing applications. However, this requires an attacker to gain root or administrative level access to gain full control of the system.
    Creators:
    Divisions: Academic > School of Computing, Engineering and Built Environment > Department of Computing
    Copyright holder: Copyright © Glasgow Caledonian University
    Viewing permissions: World
    Depositing User:
    Date Deposited: 12 Nov 2018 11:29
    Last Modified: 13 Feb 2020 12:02
    URI: https://edshare.gcu.ac.uk/id/eprint/4268

    Actions (login required)

    View Item View Item

    Toolbox

    There are no actions available for this resource.