Covering your tracks
All engagements should be authorized by the client, no matter what. This is not to say that after all of the scanning and exploiting is over one packs up and goes home; someone still has to present the findings to the client in a manner they can understand. But before this can happen, we must clean up the exploits or tools we left in the environment. Sometime this may or may not mean removing binaries or editing logs, I say editing because any sysadmin who sees no logs should get concerned very fast. As both Windows and Linux have their respective log mechanisms and they are very well-documented, there is no need to cover them here. I suggest you keep track of what you have changed on the system and be creative when you need to hide something; use system services names or usernames that would fit in to the accounts, for example, don't name the account EliteHAK3R.
- 網(wǎng)絡(luò)安全與管理
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 信息系統(tǒng)安全檢測(cè)與風(fēng)險(xiǎn)評(píng)估
- Wireshark 2 Quick Start Guide
- INSTANT Windows PowerShell
- API攻防:Web API安全指南
- 網(wǎng)絡(luò)安全三十六計(jì):人人該懂的防黑客技巧
- 防火墻技術(shù)與應(yīng)用(第2版)
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- Learning Devise for Rails
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- 華為Anti-DDoS技術(shù)漫談
- 捍衛(wèi)隱私
- 數(shù)字銀行安全體系構(gòu)建
- 黑客攻防與電腦安全從新手到高手(超值版)