On 26-Jan-10, at 1:15 PM, Larry Seltzer wrote:

>>> I've worked with enough penetration test teams and different pen
> testers to identify that each attacker/intruder definitely has
> identifiable "styles," habits and other traits that could be
> identifiable give-aways.
>
> If you're experienced enough to recognize them, are you also able to
> mimic them, perhaps throwing off an investigation?

Yes, probably. But then you get into the snake eating its own tail,
and your Buster Buster Buster will nullify that. (ref: big hit, movie).

cheers,
--dr

--
World Security Pros. Cutting Edge Training, Tools, and Techniques
Vancouver, Canada March 22-26  http://cansecwest.com
Amsterdam, Netherlands June 16/17 http://eusecwest.com
pgpkey http://dragos.com/ kyxpgp





_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to