Discover the necessity of hiding files and the use of alternate data streams and steganography as tactics for hiding information. Explore how to cover tracks after breaching a system, including disabling auditing systems and clearing logs.
Learning Objectives
CEHv10: Hidden Files and Covering Tracks
- describe why hiding files is necessary and show the use of alternate data streams and steganography as tactics for hiding information
- describe the concept of covering your tracks after you've breached a system, including how to remove traces of your activities by disabling auditing systems and clearing logs