On 26-Jan-10, at 1:15 PM, Larry Seltzer wrote: >>> I've worked with enough penetration test teams and different pen > testers to identify that each attacker/intruder definitely has > identifiable "styles," habits and other traits that could be > identifiable give-aways. > > If you're experienced enough to recognize them, are you also able to > mimic them, perhaps throwing off an investigation?
Yes, probably. But then you get into the snake eating its own tail, and your Buster Buster Buster will nullify that. (ref: big hit, movie). cheers, --dr -- World Security Pros. Cutting Edge Training, Tools, and Techniques Vancouver, Canada March 22-26 http://cansecwest.com Amsterdam, Netherlands June 16/17 http://eusecwest.com pgpkey http://dragos.com/ kyxpgp _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
