< Day Day Up > |
This chapter deals with hiding your tracks, or not leaving any in the first place (the latter is rarely possible). Specifically, we show how crackers sweep away the evidence of a break-in. We cover the topics of erasing audit records, attempting to defeat forensics, and creating basic covert channels [1] over the network. Also, we show how crackers can come back to an "owned" machine with confidence that it stays owned by them.
|
< Day Day Up > |