Posts

Showing posts with the label Clearing Logs

Methodology of CEH Hacking

Image
In preparation for hacking a system, attackers follow a particular methodology. They first obtain information during the foot printing, scanning, and enumeration phases, which they then use to take advantage of the target system. There are three steps within the CEH Hacking Methodology (CHM): Gaining Access:- Involves gaining access to low-privileged user accounts by cracking passwords through techniques like brute-forcing, password guessing, and social engineering, then escalating their privileges to administrative levels, to perform a protected operation. Maintaining Access:- After successfully gaining access to the target system, attackers work to keep up high levels of access to perform malicious activities like executing malicious applications and stealing, hiding, or tampering with sensitive system files.  Clearing Logs:- To maintain future system access, attackers plan to avoid recognition by legitimate system users. to stay undetected, attackers w...