Crouching Admin, Hidden Hacker: Techniques for Hiding and Detecting Traces | TechEd Europe 2012

EDN Admin

Well-known member
Joined
Aug 7, 2010
Messages
12,794
Location
In the Machine
It is always a ‘cat and mouse’ game! Funny and scary at the same time. When you try to get access to the victim’s computer, all your moves are logged, but computer owners dont always check for them. If they check, you are in trouble unless you delete the traces or fake your identity. If you fake your identity, somebody sooner or later will find you. Really?! Sounds like the never-ending skill fight! If you are interested in advanced techniques for hiding and detecting traces, techniques for launching malicious apps, debugging Windows, cheating on malware and playing with Windows working as a honeypot—this session is for you! <blockquote class="info If you are a delegate at Teched Europe 2012 that attended this session https://register.europe.msteched.com/evaluation.aspx?sc=SIA301 please submit an evaluation . Note that you will need to login with the same credentials you used when registering for the event.</blockquote> <img src="http://m.webtrends.com/dcs1wotjh10000w0irc493s0e_6x1g/njs.gif?dcssip=channel9.msdn.com&dcsuri=http://channel9.msdn.com/Feeds/RSS&WT.dl=0&WT.sessionid=Session:RSSView:e13c36c06d6346fdab09a07a0171a3cc

View the full article
 
Back
Top