Walking with the Hacker

The rest of this chapter shows you what the hacker looks for once he's into your system. This is a real transcript of an actual break-in. In this case, the victimized company's security expert detected the intruder and recorded every keystroke.

As you walk with this hacker, remember that he was looking for information and access to other systems to find more information. The company in question was lucky on two counts. First, they were lucky to have detected the hacker as soon as the attack started. Second, they were incredibly lucky that the hacker was simply window-shopping and didn't leave any destruction in his wake.

Along the walk, also keep in mind that this intruder's next stroll might just be in your neighborhood…



IT Security. Risking the Corporation
IT Security: Risking the Corporation
ISBN: 013101112X
EAN: 2147483647
Year: 2003
Pages: 73

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net