Flashcards - M5: System Hacking & Privilege Escalation

Published on January 19, 2025


What are the main steps in system hacking?
Gaining Access, Escalating Privileges, Maintaining Access, Clearing Tracks.
Name two password-cracking tools often tested on CEH.
John the Ripper and Hydra.
What is a keylogger, and how is it used?
A tool that records keystrokes, used to capture credentials or other sensitive information.
Differentiate between vertical and horizontal privilege escalation.
Vertical: Gaining higher-level access (e.g., user to admin).
Horizontal: Accessing another user’s account at the same privilege level.
What is a rootkit?
A stealthy tool that gains and maintains privileged access, often hiding its presence from the OS and security tools.
Mention a common Windows privilege escalation technique.
Exploiting unpatched vulnerabilities, weak service permissions, or insecure registry settings.
Why is clearing logs/tracks important to an attacker?
To hide evidence of unauthorized activity and hinder forensic analysis.