Chapter 6

Covert Logging

Information in this chapter:

ent Complete Stealthy Log Setup

ent Logging in Honeypots

ent Covert Channels for Logging Brief

Evil can be covert

Can good be?

It can, for a reason

Haiku 8: Anton

Introduction

While common sense and various regulations compel us to focus on protecting logs from various attacks, one of the protection methods that we can use is making the log files and logging infrastructure hidden from the attackers, ...

Get Logging and Log Management now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.