CHAPTER 5

Attacking a System

In this chapter you will

•  Describe the CEH hacking methodology and system hacking steps

•  Explore methods used to gain access to systems

•  Examine methods used to escalate privileges

•  Describe methods used to maintain access to systems

•  Investigate methods of evidence erasure

•  Identify rootkit function and types

•  Identify basics of Windows and Linux file structure, directories, and commands

Ever heard of noodling? It’s a really fun and exciting way to fish—if you’re borderline insane, have no fear of losing a finger, hand, or (in some cases) your life, and feel that the best way to even things up in the hunt is to actually get in the water with your prey. Noodling has been around for a long time and ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.