官术网_书友最值得收藏!

Covering your tracks

All engagements should be authorized by the client, no matter what. This is not to say that after all of the scanning and exploiting is over one packs up and goes home; someone still has to present the findings to the client in a manner they can understand. But before this can happen, we must clean up the exploits or tools we left in the environment. Sometime this may or may not mean removing binaries or editing logs, I say editing because any sysadmin who sees no logs should get concerned very fast. As both Windows and Linux have their respective log mechanisms and they are very well-documented, there is no need to cover them here. I suggest you keep track of what you have changed on the system and be creative when you need to hide something; use system services names or usernames that would fit in to the accounts, for example, don't name the account EliteHAK3R.

主站蜘蛛池模板: 新安县| 土默特左旗| 鄱阳县| 平罗县| 南华县| 邵阳市| 城步| 铜陵市| 深州市| 阿荣旗| 八宿县| 交城县| 怀化市| 美姑县| 囊谦县| 博白县| 洛隆县| 二手房| 景德镇市| 霞浦县| 乐亭县| 浦县| 宣恩县| 静安区| 金湖县| 芷江| 拜城县| 长沙县| 墨竹工卡县| 北辰区| 乐安县| 德令哈市| 辽宁省| 根河市| 遂川县| 西林县| 翁牛特旗| 历史| 文水县| 互助| 沈阳市|