Chapter 6

Covert Logging

Information in this chapter:

ent Complete Stealthy Log Setup

ent Logging in Honeypots

ent Covert Channels for Logging Brief

Evil can be covert

Can good be?

It can, for a reason

Haiku 8: Anton

Introduction

While common sense and various regulations compel us to focus on protecting logs from various attacks, one of the protection methods that we can use is making the log files and logging infrastructure hidden from the attackers, ...

Get Logging and Log Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.