From the course: Penetration Testing and Ethical Hacking
Unlock this course with a free trial
Join today to access over 24,400 courses taught by industry experts.
System hacking
From the course: Penetration Testing and Ethical Hacking
System hacking
- [Instructor] System Hacking. In this lesson, we're going to start talking about system hacking, and this is the phase of the process where you're actually going to start actively interacting with the target. So let's get started. It's a lot of information in the following lessons. Now, after collecting information using reconnaissance techniques such as footprinting, scanning, enumeration, and, of course, vulnerability analysis, you're now going to proceed to the next level, basically System Hacking. And it's this active communication with that target. You're going to be using all that information that you have learned up to this point to access the system. Now, the System Hacking Methodology, and really these are the goals of a hacker. So this is the process of the system hacking and is classified into the System Hacking methods. These methods are also termed CEH hacking methodology by the EC-Council. So this methodology includes gaining access, cracking passwords, vulnerability…