CEHv10: Hidden Files and Covering Tracks


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Discover the necessity of hiding files and the use of alternate data streams and steganography as tactics for hiding information. Explore how to cover tracks after breaching a system, including disabling auditing systems and clearing logs.



Expected Duration (hours)
0.8

Lesson Objectives

CEHv10: Hidden Files and Covering Tracks

  • describe why hiding files is necessary and show the use of alternate data streams and steganography as tactics for hiding information
  • describe the concept of covering your tracks after you've breached a system, including how to remove traces of your activities by disabling auditing systems and clearing logs
  • Course Number:
    it_spceh10tv_14_enus

    Expertise Level
    Intermediate