CHAPTER 17
PRIVACY TOOLS
image
The previous chapters have covered tools that focus on hacking, defending, or investigating systems and networks of systems. For some attackers, compromising any system is a goal in itself—the system might become a zombified member of a botnet or serve as a hopping point for redirecting and obscuring the source of traffic. Other attackers might be interested in the information stored on the compromised system, whether trying to find passwords to expand their reach into a network or trying to find data that can be resold to someone else. One goal of tools designed to protect privacy is to limit the amount of information ...

Get Anti-Hacker Tool Kit, Fourth Edition, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.