The following is a list of guidelines for gaining access to a network/system:
- Perform social engineering.
- Perform shoulder surfing.
- Perform various password attacks.
- Perform network sniffing.
- Perform Man-in-the-Middle (MITM) attacks.
- Use various techniques to exploit target systems and get a shell (that is, to gain access via a command line).
- Discover other devices using lateral movement.
- Attempt to escalate privileges on the compromised system.
In the next section, we will outline the fundamentals for a covering-tracks checklist.