System Hacking

Objective Password cracking Password attacks Identifying various password cracking tools Formulating countermeasures for password cracking Escalating privileges Executing applications Keyloggers and Spywares Spywares and keyloggers countermeasures Hiding files Understanding rootkits The use of Steganography Covering tracks
Offline Attacks Offline attacks are time consuming LM Hashes are much more vulnerable due to smaller key space and shorter length Web services are available Distributed password cracking techniques are available Mitigations: Use good passwords Remove LM Hashes Attacker has password database Password representations must be cryptographically secure Considerations