From the course: Ethical Hacking: System Hacking

Hacking the system

- [Lisa] Have you ever wondered how easily a malicious actor could access your system, and then once inside, what secrets will they find? In this course, we'll explore system hacking and learn how malicious parties can get deeper into a system and what powers they'll have. I'll go over methods to obtain a password. Then once acquired, ways to escalate your privileges and execute applications. I'll cover spyware capturing screen activity and keystroke loggers. I'll review ways to hide in plain sight using alternate data streams and steganography along with ways to cover your tracks. Hello, my name is Lisa Bock, and I'm a security ambassador. Are you ready? Then let's get started.

Contents