Receive Daily Updates

Enter your email address:

Wednesday, April 6, 2011

Hacking Phase 5 - Covering Tracks

Phase 5 - Covering Tracks
  • Covering Tracks refers to the activities undertaken by the hacker to extend his misuse of the system without being detected.

  • Reasons include need for prolonged stay, continued use of resources, removing evidence of hacking, avoiding legal action etc.

  • Examples include Steganography, tunneling, altering log files etc.

  • Hackers can remain undetected for long periods or use this phase to start a fresh reconnaissance to a related target system.

No comments: