From the course: Network Forensics

Unlock the full course today

Join today to access over 23,300 courses taught by industry experts.

Anti-network forensics techniques

Anti-network forensics techniques

From the course: Network Forensics

Anti-network forensics techniques

- In cybersecurity, we call anti-forensics techniques covering tracks. One of the last steps in a cyber security attack is to hide all the traces of intrusion to avoid detection. Deleting log entries or replacing the files used for auditing with fabricated versions is a common method. Attackers need significant time to accomplish their ultimate goals. Let's say that the goal is to steal credit card information. This cannot happen in five minutes as depicted in movies. It takes careful planning and persistent efforts over days and months. Reconnaissance, or recon, is the first step. Followed by an initial compromise, which could happen through an email with malicious software as its attachment. One breech can lead to another allowing more attack options or establishing a foothold for more serious future attacks. Escalating privileges is a way to obtain more permissions and access to resources are necessary to deal an ultimate blow to an unsuspecting victim. For this type of advanced…

Contents