8.4 - Cover Your Tracks
8.4 - Cover your tracks
Key Terms:
- Rootkit – A program that hackers use to establish root-level privileges to a system.
- Steganography – A method of embedding data into legitimate files like graphics, music, video, and plain text messages to hide it from everyone except the intended reader.
- NTFS data streams – One data stream stores the attributes; another stores the data.
- Slack space – The unused portion of an existing file that has been defined.
- System file logs – Files that are continuously recording when files are created, accessed, or modified.
System log files
System log files are the first place system administrators check when suspicious activity is detected. Erasing or modifying files to look as they were before the attack is a typical practice that can be done without admin privileges. In Windows, some specific files should be deleted or modified:
- Secevent.evt
- Sysevent.evt
- Appevent.evt
Hide Evidence
By choosing the hidden attribute from the attribute's menu will hide a file from browsing windows and directory listing. Alternate data streams are hidden in Windows explorer which means it is a good place to hide executable files. Hiding a file in the slack space of an existing file means that it shows no data was added to the file as it was defined previously.
Modify Timestamps
Altering timestamps on files can be done using the tool Timestomp. An attacker will change a timestamp to blend in with existing timestamps. The touch command in Unix can also alter the timestamp. ctime can also be modified to a given date/time.
Disable Auditing
As soon as a hacker gains access to a system, they will disable the auditing software. This allows them to install malware and access sensitive files. Hackers can use the command line tool AuditPol.exe to disable auditing on a machine. They can also reenable auditing to avoid suspicion after the attack is complete.
Tools
- Ccleaner – This program will remove files and clear internet browsing history.
- Clear My History – This software clears cookies and stored data along with other traces of data left on a system.
- Dump Event Log – This tool dumps an event log into a separated text file.
Clear Online Tracks
Hackers usually browse in incognito mode to cover up tracks in browsing history. They also clear cookies and caches and delete downloads, saved sessions, and user JavaScript.
Comments
Post a Comment