The goal of system hacking is to gain access, escalate privileges, execute applications, and hide files.


Objective

The objective of this lab is to help students learn to monitor a system remotely and to extract hidden files and to complete other tasks that include:
Learn to monitor a system remotely
  • Extracting administrative passwords
  • Hiding files and extracting hidden files
  • Recovering passwords
  • Monitoring a system remotely

Scenario

Password hacking is one of the easiest and most common ways hackers obtain unauthorized computer or network access. Although strong passwords that are difficult to crack (or guess) are easy to create and maintain, users often fail to take advantage of this. Therefore, passwords are one of the weakest links in the information-security chain. Passwords rely on secrecy for their security. After a password is compromised, its original owner isn'™t the only person who can access the system with it. As you'll learn, hackers have many ways to obtain passwords. Hackers can obtain passwords from local computers by using password-cracking software. To obtain passwords from across a network, hackers can use remote cracking utilities or network analyzers. This chapter demonstrates just how easily hackers can gather password information from your network and describes password vulnerabilities that exit in computer networks and countermeasures to help prevent these vulnerabilities from being exploited on your systems.

System Hacking Exercises

Ethical Hacking Exercises / System Hacking contains the following Exercises:

  • Extracting Administrator Passwords Using LCP
  • Hiding Files Using NTFS Streams
  • Find Hidden Files Using ADS Spy
  • Hiding Files Using the Stealth files Tool
  • Extracting SAM hashes using PWdump7 tool
  • Creating the Rainbow Tables using Winrtgen
  • Password Cracking using RainbowCrack
  • Extracting Administrator Passwords Using L0phtCrack
  • Password Cracking using Ophcrack
  • Hiding Data using Snow Steganography
  • Viewing, Enabling and Clearing the Audit Policies using Auditpol
  • User System Monitoring and Surveillance Needs using Spytech SpyAgent
  • Web Activity Monitoring and Recording using Power Spy 2013
  • Image Steganography using QuickStego

The Virtual Private Cloud for this Lab set utilizes:


Ethical Hacking Exercises are available as part of the following subscription:

CEHproductimage

The Exercises in this lab map to the Certified Ethical Hacker V10 Course. Each subscription provides 6 months of access to 107 Different Exercises. Each exercise contains a Scenario, Objectives, and individual step by step tasks to guide the user through all steps necessary to complete the exercise.

Lab exercises are included for:

  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Evading IDS Firewalls and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Cloud Computing
  • Cryptography
Price: $199
Add to Cart
View Cart

Buy Now