Attacking a System

In this chapter you will

•  Describe the CEH hacking methodology and system hacking steps

•  Describe methods used to gain access to systems

•  Describe methods used to escalate privileges

•  Describe methods used to maintain access to systems

•  Describe methods of evidence erasure

•  Identify rootkit function and types

•  Identify basics of Windows and Linux file structure, directories, and commands

Ever heard of noodling? It’s a really fun and exciting way to fish—if you’re borderline insane, have no fear of losing a finger, hand, or (in some cases) your life, and feel that the best way to even things up in the hunt is to actually get in the water with your prey. Noodling has been around for a long time and involves ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.