Summary


Recap

  • Hackers use a variety of means to penetrate systems.

  • Password guessing / cracking is one of the first steps. This allows access to the most sensitive information.

  • Password sniffing is a preferred eavesdropping tactic.

  • Vulnerability scanning aids hacker to identify which password cracking / other technique to use.

  • Key stroke logging /other spy ware tools are used as they gain entry to systems to keep up the attacks.

  • Invariably evidence of "having been there and done the damage" is eliminated by attackers .

  • Stealing files as well as Hiding files by way of Alternate Data Streams / Steganography is used to sneak out sensitive information.




Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
Staf of EC-Council - Ethical Hacking Student Courseware. Certidied Ethical Hacker-Exam 312-50 (EC-Council E-Business Certification Series)
ISBN: N/A
EAN: N/A
Year: 2003
Pages: 109

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net