CHAPTER 5

Attacking a System

This chapter includes questions from the following topics:

•   Describe the CEH hacking methodology and system hacking steps

•   Describe methods used to gain access to systems

•   Describe methods used to escalate privileges

•   Describe methods used to maintain access to systems

•   Describe methods of evidence erasure

•   Identify rootkit function and types

•   Identify basics of Windows and Linux file structure, directories, and commands

Did you know there’s a science to hand-to-hand combat? Pugilism (pygmachia in Greek, made into an Olympic sport in 688 BC) is the hand-to-hand combat sport better known as boxing. Despite the circus it has become in modern times, boxing was a well-respected and carefully studied ...

Get CEH Certified Ethical Hacker Practice Exams, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.