cover-your-tracks-large - Author: van Hauser / THC...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Author: van Hauser / THC I.INTRODUCTION II.MENTAL III.BASICS IV.ADVANCED V.UNDER SUSPECT VI.CAUGHT VII.PROGRAMS VIII.LAST WORDS I. INTRODUCTION Please excuse my poor english - I'm german so it's not my mother language I'm writing in. Anyway if your english is far better than mine, then don't think this text hasn't got anything to offer you. In contrast. Ignore the .. NOTE : This text is splitted into TWO parts. The first one, this, teaches about the background and theory. The second just shows the basics by an easy step-by-step procedure what to type and what to avoid. If you are too lazy to read this whole stuff here (sucker!) then read that one. It's main targets are novice unix hackers. If you think, getting the newest exploits fast is the most important thing you must think about and keep your eyes on - you are wrong. How does the best exploit helps you once the police has seized your computer, all your accounts closed and everything monitored? Not to mention the warrants etc. No, the most important thing is not to get caught. It is the FIRST thing every hacker should learn, because on many occasions, especially if you make your first hacks at a site which is security conscious because of many break-ins, your first hack can be your last one (even if all that lays back a year ago "they" may come up with that!), or you are too lazy to change your habits later in your career. So read through these sections carefully! Even a very skilled hacker can learn a bit or byte here. So this is what you find here: Section I - you are reading me, the introduction Section II - the mental things and how to become paranoid 1. Motivation 2. Why you must become paranoid 3. How to become paranoid 4. Stay paranoid Section III - the basics you should know BEFORE begin hacking 1. Preface 2. Secure Yourself 3. Your own account 4. The logs 5. Don't leave a trace 6. Things you should avoid Section IV - the advanced techniques you should take a notice of 1. Preface 2. Prevent Tracing of any kind 3. Find and manipulate any log files 4. Check the syslog configuration and logfile 5. Check for installed security programs
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6. Check the admins 7. How to "correct" checksum checking software 8. User Security Tricks 9. Miscellaneous Section V - what to do once you are under suspect Section VI - the does and dont's when you got caught Section VII - a short listing of the best programs for hiding Section VIII - last words, the common bullshit writers wanna say Read carefully and enlighten yourself. II. MENTAL CONTENTS: 1. Motivation 2. Why you must become paranoid 3. How to become paranoid 4. Stay paranoid 1. MOTIVATION The mental aspect is the key to be successful in anything. It's the power to motivate yourself, fight on if it hurts, being self
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 14

cover-your-tracks-large - Author: van Hauser / THC...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online