image
5
Attacking a System
In this chapter you will
•  Describe password attacks
•  Describe best-effort password complexity and protection
•  Describe Microsoft Authentication mechanisms
•  Identify various password-cracking tools, keyloggers, and spyware technologies
•  Define privilege escalation
•  Describe file-hiding methods, alternate data streams, and evidence erasure
•  Define rootkit
•  Understand basic Linux file structure, directories, and commands
image
Ever heard of noodling? It’s a really fun and exciting way to fish—if you’re borderline insane, ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition, 2nd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.