System Hacking
System Hacking
System hacking is the way hackers get access to individual computers on a network.
Ethical hackers will learn system hacking to detect, prevent, and countermeasures.
After gaining the knowledge from previous phases, now proceed to system hacking
phase. the method of system hacking is far difficult and sophisticated than previous
ones.
Before starting the system hacking phase, an ethical hacker must remember that you
simply cannot gain access to the target system during a go. you would like to await
what you want, deeply observe and struggle; then you'll find some results.
System Hacking Concepts/Methodology
Password Guessing
The attacker creates an inventory of all possible passwords from the knowledge
collected through social engineering or the other way and tries them manually on the
victim's machine to crack the passwords
Microsoft Authentication
There are many tools available on the web for password cracking. Some of
these tools are: -
1. Pwdump7
2. fgdump
3. L0phtCrack
4. Ophcrack
5. Rainbow Crack
6. Cain and Abel
7. John the Ripper and manymore
Password Salting
Password salting could be a technique where random string of characters are added
to the
password before calculating their hashes
Advantage: Salting makes it harder to reverse the hashes and defeats pre- computed
hash attacks
Introduction to executing applications
Once an attacker gains unauthorized way to the host and escalates privileges, nowthe
next level of the attacker is to perform malicious applications on the target system. This
execution of malicious programs is meant for gaining unauthorized access to system
resources, crack passwords, created backdoors, and for other motives. These
executable programs are often customized application or available software. This
process, execution is additionally called as "System Owning." The attacker is to have the
system. Intentions or goals, an attacker
What is Keylogger
Hardware Keyloggers:
Hardware-based Keyloggers are physical hardware's Keyloggers which are installed
on hardware by physically accessing the device. Firmware- based Keyloggers
requires physical access the to the machine to load the software into BIOS,
keyboard hardware like key grabber USB may be a physical device must be installed
in line with in the keyboard.
Below are the hardware Keyloggers are further classified into following types
includes:
1. External Keyloggers
2. PC/BIOS Embedded Keyloggers
3. Keyloggers Keyboard
Defending against Keyloggers
Anti-Keyloggers
Anti-Keyloggers are application software which guarantees protection against
keyloggers. This software removes the threat of keylogging by providing Keylogging
protection, Clipboard logging and screen logging protection
Once Intruders have successfully gained admin access on a system, they will try to
clear the log files to avoid their detection
1. Manipulating Logs
2. Clearing logs from host
3. Disable auditing
Clearing Logs
Another technique of covering track is to clear the logs files. By clearing the logs, all
circumstances logged during the compromise are going to be erased. Logs are often
cleared using command tools also as manually from control panel on a Windows
platform
Covering Tracks Tools
Below are some of the Covering tracks tools:
1. Wipe (https://privacyroot.com)
2. Tracks Eraser Pro (http://acesoft.net/)
3. ClearProg (http://clearprog.de/)
4. Free Internet Window Washer (https://www.cybertronsoft.com/)
5. BleachBit (http://bleachbit.sourceforge.net)