• 4) Using Access to Further Exploit
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet174/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   170   171   172   173   174   175   176   177   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    3) Getting access to the system 


    This is an important step in the hacking process. After having a brief scan
    and obtaining information about the systems in this step hackers will start
    attacking the system using various methods. A good hacker always chooses
    his way of attacking according to the environment that he is attacking on. A
    novice hacker can read hundreds of books but if he cannot use this
    information depending on the environment and resources, he has then there
    is no way that the access will be cracked.
    There are infinite ways of getting access to the system. Out of all these, the
    most classical way is to use social engineering abilities to trick the users
    that are present in the network area. It may be by sending an attachment to
    the receptionist or by getting connected to the modem of the LAN network
    using someone's landline phone. Getting access to the system doesn't result
    in successful exploiting because of less or void permissions. Some
    introduction detection systems can detect your access to system providers
    with a message. 
    After getting access to the system a hacker will further move to the deeper
    areas of the network that is to the closer areas of the root directory for full
    administrative privileges. Follow along with the next section to understand
    what one can do using the exploitation abilities. 
    4) Using Access to Further Exploit 
    After having successful access in the next stage hackers try to stay as much
    as the time in the system. An attacker usually tries to extend his capabilities
    or reach in the area and tries to acquire the root privileges which can help
    him get additional use cases to perform. 
    The main reason why hackers can get succeeded in this phase is because of
    bugs and vulnerabilities that are present in the web application systems or
    the login interfaces that the system users use. Professional hackers use
    hardware hacking devices like keyloggers to know passwords or secret root
    directories. In the next section, we will describe the most important phase
    of hacking in detail .

    Download 6,34 Mb.
    1   ...   170   171   172   173   174   175   176   177   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish