Chapter 16. Covering the Tracks

WHEN AN ATTACKER SUCCESSFULLY BREAKS INTO a system, one of his goals is to preserve access, so he can get back into the system whenever he wants. In certain cases, such as espionage, someone wants to get into the system, obtain some piece of information, and never get back in again. However, in most cases, an attacker wants to preserve his access. If a hacker spent a lot of time and energy researching a site and obtaining access, he would not want to do the same amount of work each time he wanted to re-enter. As we have seen in Chapter 15, “Preserving Access,” there are a lot of tools a hacker can use to preserve ...

Get Hackers Beware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.