Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Tuesday, March 31, 2009

Hacking Phase 5 - Covering Tracks

Phase 5 - Covering Tracks
  • Covering Tracks refers to the activities undertaken by the hacker to extend his misuse of the system without being detected.

  • Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc.

  • Examples include Steganography, tunneling, altering log files etc.

  • Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance to a related target system.

0 Visitor Reactions & Comments:

Newer Post Older Post Home