Chapter 6
Covert Logging
Information in this chapter:
Complete Stealthy Log Setup
Logging in Honeypots
Covert Channels for Logging Brief
Evil can be covert
Can good be?
It can, for a reason
Haiku 8: Anton
Introduction
While common sense and various regulations compel us to focus on protecting logs from various attacks, one of the protection methods that we can use is making the log files and logging infrastructure hidden from the attackers, ...
Get Logging and Log Management now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.