- Advanced Infrastructure Penetration Testing
- Chiheb Chebbi
- 76字
- 2021-06-24 19:12:47
Clearing tracks
The final phase of every successful hacking attack is clearing the tracks. It is very important, after gaining access and misusing the network, that the attacker cover the tracks to avoid being traced and caught. To do this, the attacker clears all kinds of logs and malicious malware related to the attack. During this phase, the attacker will disable auditing and clear and manipulate logs. The order of the hacking phases is shown here:

推薦閱讀
- Mastering ElasticSearch
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- Linux系統文件安全實戰全攻略
- Social Media Mining with R
- Arch Linux Environment Setup How-to
- 嵌入式操作系統(Linux篇)(微課版)
- Alfresco 4 Enterprise Content Management Implementation
- 計算機系統的自主設計
- Social Data Visualization with HTML5 and JavaScript
- VMware Horizon View Essentials
- Learn CUDA Programming
- Windows Vista終極技巧金典
- Learning Continuous Integration with Jenkins(Second Edition)
- OpenVZ Essentials
- 操作系統之哲學原理第2版