From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Disabling logging and hiding files

Disabling logging and hiding files

From the course: Ethical Hacking: System Hacking

Disabling logging and hiding files

- [Tutor] Disabling logging and hiding files are valuable skills for an ethical hacker. In this segment, we'll discuss how disabling auditing can help the team, move through a system undetected. First, let's talk about concealing files. When conducting an ethical hacking exercise, one valuable skill is to be able to hide files and tools within the system. Files can be hidden in alternate data streams or by using steganography. Ultimately, installing a root kit will provide a way to hide files and tools and give backdoor access to a system. Additionally, some root kits have log scrubbers to hide any activity. So, now let's talk about logging or auditing. Most systems employ some form of auditing, which monitors and records system activities, such as user logins, file access and configuration changes. Security monitoring systems often rely on auditing logs to generate alerts for unusual or unauthorized activities. And auditing logs are crucial for forensic investigations, following a…

Contents