>> I've worked with enough penetration test teams and different pen
testers to identify that each attacker/intruder definitely has
identifiable "styles," habits and other traits that could be
identifiable give-aways.

If you're experienced enough to recognize them, are you also able to
mimic them, perhaps throwing off an investigation?

Larry Seltzer
Contributing Editor, PC Magazine
[email protected] 
http://blogs.pcmag.com/securitywatch/

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to