Which Anti Virus

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 12 April 2013

How to Hackers Erase Tracks After Hacking

Posted on 19:35 by Unknown

Whenever someone comes in contact with another person, place, or thing, something of that person is left behind. This means that the attacker must disable logging, clear log files, eliminate evidence, plant additional tools, and cover his tracks. 

Here are some of the techniques that an attacker can use to cover his tracks:- 

(1) Disabling logging – Auditpol was originally included in the NT Resource kit for administrators. It works well for hackers too, as long as they have administrative access. 
Just point it at the victim’s system as follows: 
C:\>auditpol \\192.168.10 /disable 
Auditing Disabled 

(2) Clear the log file – The attacker will also attempt to clear the log. Tools, such as Winzapper, evidence Eliminator, or Elsave, can be used. Elsave will remove all entries from the logs, except one entry that shows the logs were cleared. 
It is used as follows: 

Elsave -s \\192.168.13.10 -1 “Security” -C 

(3) Cover their tracks – One way for attackers to cover their tracks is with rootkits. Rootkits are malicious codes designed to allow an attacker to get expanded access and hide his presence. While rootkits were traditionally a Linux tool, they are now starting to make their way into the Windows environment. Tools, such as NTrootkit and AFX Windows rootkits, are available for Windows systems. If you suspect that a computer has been rootkitted, you need to use an MD5 checksum utility or a program, such as Tripwire, to determine the viability of your programs. The only other alternative is to rebuild the computer from known good media.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Hacking | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Different Types Of Computer Ports
  • C Program Library files(Header Files)
    1. <stdio.h>: input and output  function in program. 2. <conio.h>: to clear screen and  pause information function. 3. <ctype...
  • Features Of Android KitKat
    1) The new Phone (Dialer) app is now linked online with Google Maps. This means if your type Big Bazaar in Phone app (Not Search) and if tha...
  • Free Download E-DRAW MAX
    link 1 : http://hotfile.com/dl/ 254163134/8de2252/EDM.rar.html
  • Different Operating System and Their RAM Support
    Windows 8 64 bit Enterprise  Professional : 512 GB Windows 8 64 bit :128 GB Windows 8 32 bit : 4 GB Windows 7 64 bit Ultimate, Enterprise ...
  • How To Protect Your Computer From Keyloggers
    A keylogger is a small program that stores each keystroke a user types on a specific computer's keyboard. It is capable to send log file...
  • GTU Paper Solution and Material as Per GTU syllabus
    Go to this website and download the Study material of GTU Syllabus. http://gtu-paper.blogspot.com/
  • Online Mobile Recharge Websites
    Hey here is the list of websites which helps you to make a online recharge of your mobile. Rechargeitnow.com FastRecharge.com Indiamobilerec...
  • How To Install Android on PC or Laptop
    Android has a got very important place in our Tech World.Now in market you can get many devices running on Android like Smartphones to Table...
  • How to Get Maximum Battery Life in Laptop?
    1. Backlight Levels/ Screen Brightness. ------------------------------ -------------------- You don’t always need the brightest screen for u...

Categories

  • Android
  • Android Apps
  • apps
  • BlackBerry
  • Cprog
  • dfd
  • erd
  • Facebook
  • general
  • Hacking
  • HTC
  • ios
  • java
  • Mobile
  • nokia
  • Samsung
  • Srs
  • Window Apps
  • Windows 8

Blog Archive

  • ▼  2013 (91)
    • ►  November (6)
    • ►  October (5)
    • ►  September (17)
    • ►  August (3)
    • ►  July (8)
    • ►  June (13)
    • ►  May (12)
    • ▼  April (27)
      • Windows 8 - Keyboard shortcuts
      • HTC 8x
      • Cool Wallpapers HD : Get it free
      • Gun N Strike Terrorist : Get it free
      • Temple Run For Windows Mobile
      • BOUNDRY_FILL ALGORITHM
      • E-R Diagram For Airlines Reservation System
      • E-R Diagram For Hospital Management System
      • Bypass School/College/Office Firewall
      • How to Hackers Erase Tracks After Hacking
      • Creating a fake ( Phishing ) page of gmail,faceboo...
      • Recover Password Of --> Linux Ubuntu , Windows XP,...
      • A Virus Program to Restart the Computer at Every S...
      • How To Protect Your Computer From Keyloggers
      • How to get a admin account on a school / Collage PC
      • Increase Firefox Surfing Speed
      • Blocking Ultrasurf with a Sonicwall Firewall
      • Hacking Aspx / Php websites (ACTIVE SQL INJECTION)
      • Will Facebook’s phone gamble with ANDROID / WINDOW...
      • HOW TO : Speed Up Youtube Buffering Speed
      • SRS For Hospital Management System
      • SRS for Library Management System
      • Hack Your Modem and Increase Your Download Speed
      • BlackBerry Z10 coming soon with WXGA resolution
      • Samsung Galaxy Pocket Neo and Galaxy Star with Jel...
      • Loop Mobile DND | Activate Loop Mobile Do Not Dist...
      • Hacking Cyberoam(Bypassing)
Powered by Blogger.

About Me

Unknown
View my complete profile