O'Reilly logo

Anti-Hacker Tool Kit, Fourth Edition, 4th Edition by Mike Shema

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 17
PRIVACY TOOLS
image
The previous chapters have covered tools that focus on hacking, defending, or investigating systems and networks of systems. For some attackers, compromising any system is a goal in itself—the system might become a zombified member of a botnet or serve as a hopping point for redirecting and obscuring the source of traffic. Other attackers might be interested in the information stored on the compromised system, whether trying to find passwords to expand their reach into a network or trying to find data that can be resold to someone else. One goal of tools designed to protect privacy is to limit the amount of information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required