Pages

Monday, June 28, 2010

Capture the attacker tools

Capture the attacker tools and tracks
Our scripts need to capture the attacker tools and tracks. That should include keystroke logging and facilities to capture the tools and binaries he might be up loading, if the attack. Our scripts also need to capture network traffic.

No comments:

Post a Comment