In this chapter, we will be getting insights into how to gain access to a compromised system using various techniques and covert channels. We will learn about various skills required to gain access to a compromised system including password cracking, generating backdoors, and employing deceptive social engineering techniques.
We will cover the following topics in this chapter:
- Gaining remote access
- Cracking passwords
- Creating backdoors using Backdoor Factory
- Exploiting remote services using Metasploit
- Hacking embedded devices using RouterSploit
- Social engineering using SET