Summary
In this chapter, we discussed the five phases of system hacking. In Phase 1, we covered how to gain access to the system. Once we understand the system and which services are running, we need to find out what the username and password are. We also discussed the various ways to crack passwords. Phase 2 discussed escalating privileges. We can either escalate the privilege of an account we create or take an account that already exists. In Phase 3, we discussed how to maintain access by launching applications and tools that will allow you to continue your attack from inside the system and allow you to can get back in more easily. Phase 4 discussed the various ways of hiding our tools. This allows us to hide information or anything we may want to use in our attack. Phase 5 discussed covering our tracks and how we do that. It covered how to disable auditing, allowing you to accomplish the purposes of your hacking, and then how to enable auditing and get back out of the system undetected...