
Hacking Techniques and Tools • Chapter 5 177
Still worse are the intruders who have intentionally breached a
system in the pursuit of acquiring access to proprietary or sensitive data.
In some cases, the intruder may simply take a copy of the data—credit
card databases, source code, trade secrets, or otherwise—for his own use.
In other cases, the intruder may alter the data to suit his own ends. If the
data in question is source code, the intruder could conceivably introduce
malicious code into the product, which would in turn render vulnerable
to specific attack any system that used the software.This type of intruder
has been widely reputed by companies ...