Gaining Network Access

In this chapter, we will be getting insights into how to gain access to a compromised system using various techniques and covert channels. We will learn about various skills required to gain access to a compromised system including password cracking, generating backdoors, and employing deceptive social engineering techniques.

We will cover the following topics in this chapter:

  • Gaining remote access
  • Cracking passwords
  • Creating backdoors using Backdoor Factory
  • Exploiting remote services using Metasploit
  • Hacking embedded devices using RouterSploit
  • Social engineering using SET
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.114.38