Forensic Findings

The team of experts got to work. As part of the team, I was asked to review some of the Internet hacking tools and telco hacking methods. One of the most interesting findings was the incredible number of tools being exchanged on this site. To simplify the review, we can classify them as follows:

  • Tools to discover remotely accessible computers.

  • Tools to assess a computer's vulnerabilities.

  • Tools to gain unauthorized access to a computer.

  • Tools to promote a user's permission on a UNIX system to root.

  • Tools to monitor user activity.

  • Back doors to cover their tracks and maintain access.

The assortment we found was so rich that it could satisfy almost any hacker's needs. The only thing lacking was denial of service tools. This bulletin ...

Get HIGH-TECH CRIMES REVEALED: CYBERWAR STORIES FROM THE DIGITAL FRONT now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.