Sunday, 31 January 2016

Maintaining Access And Covering Tracks

Maintaining Access And Covering Tracks



4.MAINTAINING ACCESS:
 AFTER GAINING ACCESS,THE ATTACKER ESCALATES THE PRIVILEGES TO ROOT/ADMIN AND UPLOADS A PIECE OF CODE(USUALLY CALLED AS BACKDOOR) ON THE TARGET NETWORK SO THAT HE ALWAYS MAINTAIN THE GAINED ACCESS AND CAN CONNECT TO TARGET ANYTIME! B)

5.COVERING TRACK:
AFTER GAINING ACCESS AND MAINTAINING THE SAME, HACKER EXPLOITS THE WEAKNESS AND HACKS THE NETWORK OR MISUSES THE ACCESS! AFTER THAT, COMES THE IMPORTANT PHASE—> COVERING THE TRACKS! TO AVOID GETTING TRACED AND CAUGHT,HACKER CLEARS ALL THE TRACKS BY CLEARING ALL KINDS OF LOGS AND DELETED THE UPLOADED BACKDOOR AND  ANYTHING RELATED STUFF WHICH MAY LATER REFLECT HIS PRESENCE!


















No comments:

Post a Comment