Tài liệu tham khảo về hacker máy tính bằng tiếng anh | Module III Enumeration Overview of System Hacking Cycle Step 1 Enumerate users Extract user names using Win 2K enumeration and SNMP probing Step 2 Crack the password Crack the password of the user and gain access to the system Step 3 Escalate privileges Escalate to the level of the administrator Step 4 Execute applications Plant keyloggers spywares and rootkits on the machine Step 5 Hide files Use steganography to hide hacking tools and source code Step 6 Cover your tracks Erase tracks so that you will not be caught What is Enumeration Enumeration is defined as extraction of user names machine names network resources shares and services Enumeration techniques are conducted in an intranet environment Enumeration involves active connections to systems and directed queries The type of information enumerated by intruders Network resources and shares Users and groups Applications and banners Auditing .