• Clearing Tracks
  • Python scripting for the hacker Introduction to Python
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet103/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   99   100   101   102   103   104   105   106   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    Maintaining Access - once the hacker has gained access, they can be
    kicked out or locked out by the security system of the target. The hacker
    has to maintain access through uploading trojan, rootkits, or malicious
    files. This may reduce the privilege for the administrator or even help
    the hacker to keep the connection without knowledge of the
    administrator.


    5) 
    Clearing Tracks - a hacker can be seen as a thief or an intruder. After
    accessing the system, the administrator will want to catch the intruder.
    The hacker, therefore, needs to cover up their tracks to avoid being
    caught. This step, therefore, will involve the hacker modifying the logs
    to the system to remove any evidence of them accessing the network. If
    the hacker had uploaded any files or installed any applications, they
    need to uninstall them to ensure that the administrator cannot detect their
    presence.
    The above phases are a basic outline of the hacking process. All hacks
    follow a similar process. Various modifications can be made by the hacker
    to fit the needs of the hacker. For example, if one wants to prove or show
    the weakness of a system, they do not have to clear tracks. Failure to cover
    their tracks will help the administrator identify that there was an intruder in
    the order. Once the hacker has infiltrated the system, they can do whatever
    they desire. It is significant to note that in many cases that hackers are seen
    as a threat to the system despite having good intentions.
    Python scripting for the hacker
    Introduction to Python
    Python is an interpretive language accompanied by elegant syntax, which
    makes an outstanding choice for scripting and rapid application
    development in many areas. It is a dynamically typed programming
    language. Python is also better for data manipulation and repeated tasks. Its
    ability to manipulate data makes it very good for hacking. It has very easy
    language and syntax that a hacker can use to make the best scripts. It has a
    large database and very many libraries that allow the user to have access to
    much information that they may need to hack any system.
    Further, the fact that the language has very little syntax makes it simple to
    use. Experts also prefer to use because one does not have to struggle with
    the syntax. This will mean that a beginner will have an easy time creating
    scripts using python. Its high performance is also another reason as to why
    it has a very large number of users.

    Download 6,34 Mb.
    1   ...   99   100   101   102   103   104   105   106   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish