View
7
Download
0
Category
Preview:
Citation preview
• Bilişim güvenliğinin önemi• Güvenlik ihtiyacı
Footprinting Scanning Enumeration
Hacking Gaining Access
Privilege Escalation
Hiding Files
Cover Tracking
Password Cracking
Vulnerability Management
Active Online Attack
Passive Online Attack
Manuel Password Cracking
Dictionary Attack
Brute-Force Attack
Hybrid Attack
Keylogger
Spyware
Trojan
Donanımsal Keylogger
PC/BIOS Embedded
Keylogger Keyboard
External Keylogger
• PS/2-USB Keylogger• Wi-Fi Keylogger• Bluetooth Keylogger
Yazılımsal Keylogger
Application Keylogger
Kernel Keylogger
Rootkit Keylogger
Sniffing
MITM (MAN IN THE MIDLE)
Bilgi Toplama
Şifre Tahmin
Discover Devices
Gain Access
Take Control
Automated Exploitation
Manuel Exploitation
Command Shell Session
Meterpreter Session
Manuel Authentication
Yetki Yükseltme
Rootkit
ADS (Alternate Data Stream)
Events
Most Recent Used
Recommended