Pluralsight is not an official partner or accredited training center of EC-Council. You’ve done your homework; now it’s time to totally and completely “pwn” your target and yet make no one the wiser that you’ve made it in.
Pluralsight is not an official partner or accredited training center of EC-Council. This is what it all comes down to. After we’ve done our research, we’ve found our target, and identified its services, shares, users and resources, it’s time to take total and complete control of this box. In turn, we then use this box to repeat our efforts to pwn more boxes within the network as well as grab any intellectual property that could be of great worth. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking.
01 Understanding This Stage
02 Phase 1 – Gaining Access – Cracking Passwords
03 More Cracking
04 Phase 2 – Gaining Access – Escalating Privileges
05 Phase 3 – Maintaining Access – Executing Applications
06 Phase 4 – Maintaining Access – Hiding Your Tools
07 Phase 5 – Covering Your Tracks – Clearing Logs and Evidence