Tuesday, August 02, 2005

How Attackers Avoid Detection Post-Intrusion

The following are common ways attackers conceal themselves on systems they're already compromised:
  • Using rootkits
  • Hiding data
  • Tampering with log files

Here are some common ways to hide data:

  • Use the hidden file attribute
  • Hide data in NTFS alternate file streams
  • Replace or rename files
  • Use steganography

Adopted from the book Assessing Network Security by Ben Smith, David LeBlanc, Kevin Lam.

2 Comments:

At 8:42 AM, Anonymous Anonymous said...

office 2000 product key crack
multiie 3.1 keygen
2006 keygen panda platinum
digitalfilm 1.65 crack
jewel quest crack 1.215




pinacle studio 8 crack
file scavenger 3.0 crack
iuvcr crack
egirl 1.2 crack
mosaic creator 2.9 crack
intervideo windvd6 crack
ghost recon crack
mastercook 8 warez
magic interlacer pro keygen
crack adobe acrobat 6.0
do you like horney bunnies crack
sketch up 4.0 crack
magictweak keygen
omniquad antispy crack
clone dvd2 2.7.1.1 crack
active keys 2.11 keygen
stream anywhere crack
decoz crack
msbackuprecovery crack
internet security 2003 crack
breeze browser pro keygen
reply music crack
commando keygen republic

 
At 4:50 PM, Anonymous Anonymous said...

buy tramadol online order tramadol - buy tramadol texas

 

Post a Comment

<< Home