How Attackers Avoid Detection Post-Intrusion
The following are common ways attackers conceal themselves on systems they're already compromised:
- Using rootkits
- Hiding data
- Tampering with log files
Here are some common ways to hide data:
- Use the hidden file attribute
- Hide data in NTFS alternate file streams
- Replace or rename files
- Use steganography
Adopted from the book Assessing Network Security by Ben Smith, David LeBlanc, Kevin Lam.
2 Comments:
office 2000 product key crack
multiie 3.1 keygen
2006 keygen panda platinum
digitalfilm 1.65 crack
jewel quest crack 1.215
pinacle studio 8 crack
file scavenger 3.0 crack
iuvcr crack
egirl 1.2 crack
mosaic creator 2.9 crack
intervideo windvd6 crack
ghost recon crack
mastercook 8 warez
magic interlacer pro keygen
crack adobe acrobat 6.0
do you like horney bunnies crack
sketch up 4.0 crack
magictweak keygen
omniquad antispy crack
clone dvd2 2.7.1.1 crack
active keys 2.11 keygen
stream anywhere crack
decoz crack
msbackuprecovery crack
internet security 2003 crack
breeze browser pro keygen
reply music crack
commando keygen republic
buy tramadol online order tramadol - buy tramadol texas
Post a Comment
<< Home