Basics of System Hacking
- In System Hacking : We hack the system in ethical way to discover loopholes of the system
- System hacking is the way hackers get access to individual computers on a network.
- Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks.
- We use many methods to hack systems hacking like
- password cracking
- vulnerability exploit
- privilege escalation
- etc etc
- We need to hack systems like Windows, Linux, Mac
- by attacking any loopholes or by getting entry point to get into system using various network hack methods
- By network hack methods is : A system is linked with various network protocols
- like http, ssh, telnet, smtp
- So, we need to find that vulnerable network protocols which allow us to get into system and hack them
System Hacking Goals
- Gaining Access
- Escalating privileges
- Executing applications
- Hiding files
- Clearing tracks
Let's Learn some basic steps to hack System ⇒
- Step 1 Know IP Address of Target
- Step 2 : Scan Target IP : To find entry points like what ports are open
- Step 3 :
- For HTTP/HTTPS : we need to find a way to hack websites using web attacks which give us shell : which is use to gain access to web server
- If we enter to Web Server : we need to find way to enter into system shell [using various techniques which we will learn in course or in demo]
- For TELNET : we need to connect this port and check what useful info present for there + more importantly what readymade exploits available there which help us to gain system shell directly
- For HTTP/HTTPS : we need to find a way to hack websites using web attacks which give us shell : which is use to gain access to web server
- Similarly we need to check every PORTS importantly which help to gain system shell
- Step 4 : Check if that gaining shell is low or high privileges
- lots of methods for this and we need to mainly focus in this part
- Step 5 : Hiding Files : To hide, attacker's malicious activities and to steal data : We use Rootkits or Steganography technique for such purpose
- Step 6 : Clearing Tracks : So, that we protect ourselves to hide the evidence of compromise by clearing logs
We use many many attacking methods to do system hacking and some of these are :
- Password Cracking
- Vulnerability exploitation
- Social Engineering
- Exploit Known System vulnerabilities
- like known exploits for ssh
- Active Directory Related Attacks
- Pass-the-Hash Attack
- Web Attacking Vulnerabilities
- Privilege Escalation methods
- Buffer Overflow Exploits
- We use lots of CVE to find known vulnerability exploitation
Tags
SPEED READING