Covering your tracks
All engagements should be authorized by the client, no matter what. This is not to say that after all of the scanning and exploiting is over one packs up and goes home; someone still has to present the findings to the client in a manner they can understand. But before this can happen, we must clean up the exploits or tools we left in the environment. Sometime this may or may not mean removing binaries or editing logs, I say editing because any sysadmin who sees no logs should get concerned very fast. As both Windows and Linux have their respective log mechanisms and they are very well-documented, there is no need to cover them here. I suggest you keep track of what you have changed on the system and be creative when you need to hide something; use system services names or usernames that would fit in to the accounts, for example, don't name the account EliteHAK3R.
- Extending Symfony2 Web Application Framework
- Practical Network Scanning
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 網絡安全意識導論
- 計算機使用安全與防護
- 開發者的Web安全戒律:真實威脅與防御實踐
- CTF競賽權威指南(Pwn篇)
- Spring Security(Third Edition)
- 可信計算3.0工程初步(第二版)
- 安全防御入門手冊
- 網絡關鍵設備安全檢測實施指南
- 黑客攻防實戰從入門到精通
- Mastering Linux Security and Hardening
- 捍衛隱私
- Hands-On Artificial Intelligence for Cybersecurity