官术网_书友最值得收藏!

Covering your tracks

All engagements should be authorized by the client, no matter what. This is not to say that after all of the scanning and exploiting is over one packs up and goes home; someone still has to present the findings to the client in a manner they can understand. But before this can happen, we must clean up the exploits or tools we left in the environment. Sometime this may or may not mean removing binaries or editing logs, I say editing because any sysadmin who sees no logs should get concerned very fast. As both Windows and Linux have their respective log mechanisms and they are very well-documented, there is no need to cover them here. I suggest you keep track of what you have changed on the system and be creative when you need to hide something; use system services names or usernames that would fit in to the accounts, for example, don't name the account EliteHAK3R.

主站蜘蛛池模板: 琼海市| 华亭县| 巧家县| 马鞍山市| 嘉峪关市| 诸城市| 洛南县| 汽车| 腾冲县| 南阳市| 河北区| 宁乡县| 台中市| 巴彦县| 彭州市| 清水河县| 平昌县| 临清市| 重庆市| 曲靖市| 盐山县| 东至县| 峨眉山市| 阳曲县| 游戏| 安远县| 民县| 莒南县| 台山市| 江永县| 大新县| 乐昌市| 贡嘎县| 云阳县| 德庆县| 土默特右旗| 乌海市| 玛纳斯县| 罗定市| 和静县| 庆元县|