官术网_书友最值得收藏!

Covering your tracks

All engagements should be authorized by the client, no matter what. This is not to say that after all of the scanning and exploiting is over one packs up and goes home; someone still has to present the findings to the client in a manner they can understand. But before this can happen, we must clean up the exploits or tools we left in the environment. Sometime this may or may not mean removing binaries or editing logs, I say editing because any sysadmin who sees no logs should get concerned very fast. As both Windows and Linux have their respective log mechanisms and they are very well-documented, there is no need to cover them here. I suggest you keep track of what you have changed on the system and be creative when you need to hide something; use system services names or usernames that would fit in to the accounts, for example, don't name the account EliteHAK3R.

主站蜘蛛池模板: 阿图什市| 望都县| 肃宁县| 左云县| 阳春市| 紫云| 黄平县| 双柏县| 兴安盟| 拜泉县| 佛山市| 昭平县| 蓝山县| 永安市| 垦利县| 郓城县| 开化县| 海林市| 乌兰察布市| 韶关市| 昌都县| 梨树县| 二连浩特市| 普兰店市| 格尔木市| 永川市| 沂南县| 屏东市| 荔浦县| 绥中县| 福泉市| 浦东新区| 柯坪县| 辉南县| 衡南县| 泾源县| 石景山区| 武隆县| 尤溪县| 蕉岭县| 噶尔县|