Gain and Maintain Access

Gain and Maintain Access

ISBN13: 9781522576280|ISBN10: 1522576282|EISBN13: 9781522576297
DOI: 10.4018/978-1-5225-7628-0.ch007
Cite Chapter Cite Chapter

MLA

Sunita Vikrant Dhavale. "Gain and Maintain Access." Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention, IGI Global, 2019, pp.178-208. https://doi.org/10.4018/978-1-5225-7628-0.ch007

APA

S. Dhavale (2019). Gain and Maintain Access. IGI Global. https://doi.org/10.4018/978-1-5225-7628-0.ch007

Chicago

Sunita Vikrant Dhavale. "Gain and Maintain Access." In Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7628-0.ch007

Export Reference

Mendeley
Favorite

Abstract

The gaining access phase in the ethical hacking process focuses on getting access to the individual host on a network based on the information collected during previous phases. Actual attacking starts in this phase, where an attacker will carry out password cracking/password sniffing attacks along with privilege escalation attacks to gain administrative privileges on the target host bypassing computer security. Once access is gained, maintaining that access on compromised hosts becomes important for an attacker in order to carry out future attacks. This chapter includes a study of tools and techniques like password cracking or social engineering attacks in order to gain the access on target machines based on the information collected during the previous phases. The chapter also introduces the tools and techniques used for escalating privileges by exploiting vulnerabilities, executing spyware/backdoor/key loggers/rootkits/trozans applications, etc. The chapter also explains the techniques used to maintain access in compromised hosts, to cover tracks/evidence, and methods to avoid detection. An attacker may use rootkits during this phase to hide his presence and maintain access to the compromised hosts. An attacker may hide files using rootkits/steganographic techniques, hide directories, hide attributes, use alternate data streams (ADS), place backdoors, and cover tracks by modifying/deleting log files. All these techniques are explained in this chapter.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.