Читать книгу Hacking For Dummies - Kevin Beaver - Страница 47
Maintaining Anonymity
ОглавлениеSmart attackers want to remain as low-key as possible. Covering their tracks is a priority, and their success often depends on remaining unnoticed. They want to avoid raising suspicion so that they can come back and access the systems in the future.
Hackers often remain anonymous by using one of the following resources:
Borrowed or stolen remote desktop and virtual private network (VPN) accounts of friends or previous employers
Public computers at libraries, schools, or hotel business centers
Open wireless networks
VPN software or open proxy servers on the Internet
Anonymous or disposable email accounts
Open email relays
Infected computers (also called zombies or bots) at other organizations
Workstations or servers on the victim’s own network
If hackers use enough stepping stones for their attacks, they’re practically impossible to trace. Luckily, one of your biggest concerns — the malicious user — generally isn’t quite as savvy unless the hacker is a network or security administrator. In that case, you’ve got a serious situation on your hands. Without strong oversight, there’s nothing you can do to stop hackers from wreaking havoc on your network.