Know Your Enemy: III

Data from over 200 Pen Tests Shows Most Common Vulnerabilities. Learn more now.

What happens after the script kiddie gains root. Specifically, how they cover their tracks while they monitor your system. The paper goes through step by step on a system that was compromised, with system logs and keystrokes to verify each step.

Read the paper in HTML format here.