O'Reilly logo

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition by Matt Walker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5

Attacking a System

In this chapter you will

•  Describe the CEH hacking methodology and system hacking steps

•  Describe methods used to gain access to systems

•  Describe methods used to escalate privileges

•  Describe methods used to maintain access to systems

•  Describe methods of evidence erasure

•  Identify rootkit function and types

•  Identify basics of Windows and Linux file structure, directories, and commands

Ever heard of noodling? It’s a really fun and exciting way to fish—if you’re borderline insane, have no fear of losing a finger, hand, or (in some cases) your life, and feel that the best way to even things up in the hunt is to actually get in the water with your prey. Noodling has been around for a long time and involves ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required