
Hacking Techniques and Tools • Chapter 5 207
Solutions Fast Track
A Hacker’s Goals
; Intruders will utilize numerous tactics and tools to evade detec-
tion when they scan your networks and systems.They may use
stealth scans or fragmented TCP packets.
; Skilled intruders will carefully plan their attack for when you
least expect it. Based on their early reconnaissance of your sys-
tems, they will already have assembled the tools to take control
of your system after it has been successfully penetrated.
; Rootkits are compilations of tools that contain Trojan versions
of common system-monitoring utilities and modified kernel
patches and shared library objects ...