From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Disabling logging and hiding files
From the course: Ethical Hacking: System Hacking
Disabling logging and hiding files
- [Tutor] Disabling logging and hiding files are valuable skills for an ethical hacker. In this segment, we'll discuss how disabling auditing can help the team, move through a system undetected. First, let's talk about concealing files. When conducting an ethical hacking exercise, one valuable skill is to be able to hide files and tools within the system. Files can be hidden in alternate data streams or by using steganography. Ultimately, installing a root kit will provide a way to hide files and tools and give backdoor access to a system. Additionally, some root kits have log scrubbers to hide any activity. So, now let's talk about logging or auditing. Most systems employ some form of auditing, which monitors and records system activities, such as user logins, file access and configuration changes. Security monitoring systems often rely on auditing logs to generate alerts for unusual or unauthorized activities. And auditing logs are crucial for forensic investigations, following a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.