O'Reilly logo

CEH: Certified Ethical Hacker Version 8 Study Guide by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7Gaining Access to a System

  1. image III. Security
    • O. Vulnerabilities
  2. image IV. Tools/Systems/Programs
    • O. Operating Environments
    • Q. Log Analysis Tools
    • S. Exploitation Tools

Using the information gathered so far, you can now transition into the next phase: gaining access to a system. All the information you’ve gathered up to this point has been focused toward this goal. In this chapter, you will see how you can use information from previous interactions to “kick down the door” of a system and carry ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required