From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,200 courses taught by industry experts.
Getting a foothold
From the course: Ethical Hacking: System Hacking
Getting a foothold
- [Narrator] After scanning the network and obtaining a blueprint, the next step in an ethical hacking exercise is to infiltrate the system. In this segment, we'll explore various methods used to gain access to a system. After reconnaissance and scanning is complete, the following phase is to gain access to the network using a variety of tools and techniques. The methods commonly involve exploiting vulnerabilities in software, hardware, or configurations that have been identified during the scanning phase. In addition, many times, a social engineering attack is used to manipulate individuals into revealing their passwords or installing malicious software. Let's talk about some of the tools or techniques used in this phase. One technique is to infect a system with malware, which can be done using a social engineering attack and tricking an employee into clicking a link and downloading malware onto a system. Additionally, implanting malicious code on a website and creating a drive-by…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.