Crouching Admin, Hidden Hacker: Techniques for Hiding and Detecting Traces

Download

Right click “Save as…”

Slides (view online)
It is always a ‘cat and mouse’ game! Funny and scary at the same time. When you try to get access to the victim’s computer, all your moves are logged, but computer owners don't always check for them. If they check, you are in trouble unless you delete the traces or fake your identity. If you fake your identity, somebody sooner or later will find you. Really?! Sounds like the never-ending skill fight! If you are interested in advanced techniques for hiding and detecting traces, techniques for launching malicious apps, debugging Windows, cheating on malware and playing with Windows working as a honeypot—this session is for you!

Follow the Discussion

Comments Closed

Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums,
or Contact Us and let us know.