# Module 6. System Hacking

- [1. Gain access to the system](/module-6.-system-hacking/1.-gain-access-to-the-system.md)
- [2. Privilege Escalation](/module-6.-system-hacking/2.-privilege-escalation.md): Privilege Escalation techniques to learn for CEH Practical
- [3. Maintain Remote Access and Hide Malicious Activities](/module-6.-system-hacking/3.-maintain-remote-access-and-hide-malicious-activities.md): Remote code execution techniques are often performed after initially compromising a system and further expanding access to remote systems present on the target network.
- [4. Clear Logs to hide the Evidence of Compromise](/module-6.-system-hacking/4.-clear-logs-to-hide-the-evidence-of-compromise.md): To remain undetected, the intruders need to erase all evidence of security compromise from the system.
- [5. Active Directory (AD) Attacks](/module-6.-system-hacking/5.-active-directory-ad-attacks.md): The module has recently been added in CEH V13 Practical
