Chapter 10. Hiding the Tracks

 <  Day Day Up  >  

This chapter deals with hiding your tracks, or not leaving any in the first place (the latter is rarely possible). Specifically, we show how crackers sweep away the evidence of a break-in. We cover the topics of erasing audit records, attempting to defeat forensics, and creating basic covert channels [1] over the network. Also, we show how crackers can come back to an "owned" machine with confidence that it stays owned by them.

[1] Here, the definition of a covert channel does not stem from the classic definition from the "Light Pink Book" of the Rainbow Series, but simply covers any hidden method of communicating with a compromised system.

 <  Day Day Up  >  


Security Warrior
Security Warrior
ISBN: 0596005458
EAN: 2147483647
Year: 2004
Pages: 211

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net