From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 24,200 courses taught by industry experts.

Getting a foothold

Getting a foothold

- [Narrator] After scanning the network and obtaining a blueprint, the next step in an ethical hacking exercise is to infiltrate the system. In this segment, we'll explore various methods used to gain access to a system. After reconnaissance and scanning is complete, the following phase is to gain access to the network using a variety of tools and techniques. The methods commonly involve exploiting vulnerabilities in software, hardware, or configurations that have been identified during the scanning phase. In addition, many times, a social engineering attack is used to manipulate individuals into revealing their passwords or installing malicious software. Let's talk about some of the tools or techniques used in this phase. One technique is to infect a system with malware, which can be done using a social engineering attack and tricking an employee into clicking a link and downloading malware onto a system. Additionally, implanting malicious code on a website and creating a drive-by…

Contents