FN SECURE: Hacking Phase 5 - Covering Tracks

Call Us For Workshops Or Seminars.. In Your University, Colleges, or Schools.
Email Us At : vicky@globallyunique.in

Hacking Phase 5 - Covering Tracks


Phase 5 - Covering Tracks

*

Covering Tracks refers to the activities undertaken by the hacker to extend his misuse of the system without being detected.
*

Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc.
*

Examples include Steganography, tunneling, altering log files etc.
*

Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance to a related target system.

Leave a Reply

Save this Page

Download as PDF