Читать книгу Hacking For Dummies - Kevin Beaver - Страница 47

Maintaining Anonymity

Оглавление

Smart attackers want to remain as low-key as possible. Covering their tracks is a priority, and their success often depends on remaining unnoticed. They want to avoid raising suspicion so that they can come back and access the systems in the future.

Hackers often remain anonymous by using one of the following resources:

 Borrowed or stolen remote desktop and virtual private network (VPN) accounts of friends or previous employers

 Public computers at libraries, schools, or hotel business centers

 Open wireless networks

 VPN software or open proxy servers on the Internet

 Anonymous or disposable email accounts

 Open email relays

 Infected computers (also called zombies or bots) at other organizations

 Workstations or servers on the victim’s own network

If hackers use enough stepping stones for their attacks, they’re practically impossible to trace. Luckily, one of your biggest concerns — the malicious user — generally isn’t quite as savvy unless the hacker is a network or security administrator. In that case, you’ve got a serious situation on your hands. Without strong oversight, there’s nothing you can do to stop hackers from wreaking havoc on your network.

Hacking For Dummies

Подняться наверх