Basics of System Hacking




Basics of System Hacking

  • In System Hacking : We hack the system in ethical way to discover loopholes of the system
  • System hacking is the way hackers get access to individual computers on a network.
  • Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks.
  • We use many methods to hack systems hacking like
    • password cracking
    • vulnerability exploit
    • privilege escalation
    • etc etc
  • We need to hack systems like Windows, Linux, Mac
    • by attacking any loopholes or by getting entry point to get into system using various network hack methods
  • By network hack methods is : A system is linked with various network protocols
    • like http, ssh, telnet, smtp
  • So, we need to find that vulnerable network protocols which allow us to get into system and hack them

System Hacking Goals

  1. Gaining Access
  2. Escalating privileges
  3. Executing applications
  4. Hiding files
  5. Clearing tracks

Let's Learn some basic steps to hack System ⇒

  • Step 1 Know IP Address of Target
  • Step 2 : Scan Target IP : To find entry points like what ports are open
  • Step 3 :
    • For HTTP/HTTPS : we need to find a way to hack websites using web attacks which give us shell : which is use to gain access to web server
      • If we enter to Web Server : we need to find way to enter into system shell [using various techniques which we will learn in course or in demo]
    • For TELNET : we need to connect this port and check what useful info present for there + more importantly what readymade exploits available there which help us to gain system shell directly
  • Similarly we need to check every PORTS importantly which help to gain system shell
  • Step 4 : Check if that gaining shell is low or high privileges
    • lots of methods for this and we need to mainly focus in this part
  • Step 5 : Hiding Files : To hide, attacker's malicious activities and to steal data : We use Rootkits or Steganography technique for such purpose
  • Step 6 : Clearing Tracks : So, that we protect ourselves to hide the evidence of compromise by clearing logs

We use many many attacking methods to do system hacking and some of these are :

  • Password Cracking
  • Vulnerability exploitation
  • Social Engineering
  • Exploit Known System vulnerabilities
    • like known exploits for ssh
  • Active Directory Related Attacks
  • Pass-the-Hash Attack
  • Web Attacking Vulnerabilities
  • Privilege Escalation methods
  • Buffer Overflow Exploits
  • We use lots of CVE to find known vulnerability exploitation

Post a Comment

Previous Post Next Post