Abstract
acking into systems involves a methodological approach which consists of various tools and techniques. This chapter covers the basics of the hacking lifecycle, starting from cracking the passwords to gain entry into remote systems up through covering one’s tracks and traces before exiting from the compromised system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Sagar Ajay Rahalkar
About this chapter
Cite this chapter
Rahalkar, S.A. (2016). Hacking Basics. In: Certified Ethical Hacker (CEH) Foundation Guide. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2325-3_9
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2325-3_9
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2324-6
Online ISBN: 978-1-4842-2325-3
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books