1 1 00:00:00,811 --> 00:00:02,141 In this course, you've learned some 2 2 00:00:02,141 --> 00:00:06,269 of the basic techniques and methods used by cyber-attackers. 3 3 00:00:06,269 --> 00:00:09,253 At this point, we've covered many different techniques 4 4 00:00:09,253 --> 00:00:10,253 throughout the course and throughout 5 5 00:00:10,253 --> 00:00:11,836 all six phases of a hack. 6 6 00:00:11,836 --> 00:00:14,209 We've combed the web to gather opensource information 7 7 00:00:14,209 --> 00:00:15,963 and social media and other sources 8 8 00:00:15,963 --> 00:00:17,528 during our reconnaissance phase. 9 9 00:00:17,528 --> 00:00:19,361 Then we scanned and enumerated the network using 10 10 00:00:19,361 --> 00:00:21,418 Central Ops and Zenmap. 11 11 00:00:21,418 --> 00:00:23,451 Next, we gained access to our victim using 12 12 00:00:23,451 --> 00:00:25,956 the Metasploit framework and well-known vulnerabilities 13 13 00:00:25,956 --> 00:00:28,412 that we identified during that enumeration phase. 14 14 00:00:28,412 --> 00:00:30,733 Once on the victim machine, we escalated our privileges 15 15 00:00:30,733 --> 00:00:34,203 using process migration, password cracking and hash jumps. 16 16 00:00:34,203 --> 00:00:35,985 We then maintained our access by manipulating 17 17 00:00:35,985 --> 00:00:38,505 the firewall and creating additional user accounts 18 18 00:00:38,505 --> 00:00:40,804 and giving those accounts administrative rights. 19 19 00:00:40,804 --> 00:00:42,724 Finally, we covered our tracks using alternate 20 20 00:00:42,724 --> 00:00:44,960 data streams to hide the information and tools 21 21 00:00:44,960 --> 00:00:46,105 and used automated scheduling 22 22 00:00:46,105 --> 00:00:48,985 to create call-backs and back doors. 23 23 00:00:48,985 --> 00:00:50,651 I hope that this was an eye-opening experience 24 24 00:00:50,651 --> 00:00:53,566 for you into the world of hacking and a cyber-attack, 25 25 00:00:53,566 --> 00:00:54,774 and I hope it gives you a great introduction 26 26 00:00:54,774 --> 00:00:56,385 into the hacker's mindset. 27 27 00:00:56,385 --> 00:00:57,962 At the end of this course, I hope I've only left 28 28 00:00:57,962 --> 00:01:00,048 you with one question, and that's, 29 29 00:01:00,048 --> 00:01:03,023 what should I learn next to continue my hacking adventure?