-
Covering Tracks refers to the activities undertaken by the hacker to extend his misuse of the system without being detected.
-
Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc.
-
Examples include Steganography, tunneling, altering log files etc.
-
Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance to a related target system.
Wednesday, April 6, 2011
Hacking Phase 5 - Covering Tracks
For more articles similar to this post visit @
Basics Hacking Tutorials
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment