FN SECURE: Hacking Phase 5 - Covering Tracks

Call Us For Workshops Or Seminars.. In Your University, Colleges, or Schools.
Email Us At : vicky@globallyunique.in

Hacking Phase 5 - Covering Tracks

Phase 5 - Covering Tracks


Covering Tracks refers to the activities undertaken by the hacker to extend his misuse of the system without being detected.

Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc.

Examples include Steganography, tunneling, altering log files etc.

Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance to a related target system.

Leave a Reply

Save this Page

Download as PDF