Dive into ethical hacking, including gaining access, spyware, effective countermeasures, and more. This course maps to the System Hacking competency from the CEH Body of Knowledge.
Overview
Syllabus
Introduction
- Hacking the system
- Getting the most out of this course
- Hacking ethically
- Setting the stage
- Getting a foothold
- Authenticating a user
- Challenge: Reviewing Entra ID authentication methods
- Solution: Reviewing Entra ID authentication methods
- Acquiring passwords
- Discovering password tools
- Cracking passwords
- Employing rainbow tables
- Defending against password attacks
- Leveraging security flaws
- Overflowing the buffer
- Enhancing software security
- Understanding privilege escalation
- Obtaining administrator privileges
- Defending against privilege escalation
- Dissecting rootkits
- User Mode and Kernel Mode
- Using rootkits
- Detect, remove, and avoid rootkits
- Outlining keystroke loggers
- Protecting against keylogging
- Explaining spyware behavior
- Mobile spyware and invasive apps
- Defending against spyware
- Using steganography
- Swimming in the NTFS data stream
- Using whitespace steganography
- Detecting steganography
- Remaining in the system
- Staying under the radar
- Defend against persistence attacks
- Disabling logging and hiding files
- Outlining ways to cover your tracks
- Summarize the course and what's next
Taught by
Lisa Bock