Gaining Network Access

In this chapter, we will be getting insights into how to gain access to a compromised system using various techniques and covert channels. We will learn about various skills required to gain access to a compromised system including password cracking, generating backdoors, and employing deceptive social engineering techniques.

We will cover the following topics in this chapter: