October 2022
Intermediate to advanced
500 pages
19h 57m
English
If a system has been compromised, it’s too late to install security-testing tools on that machine. Issues such as backdoors and Trojan horses could provide opportunities for attackers who might want to mislead you about what they are doing.
You generally do not want to install testing tools, particularly scanners, on every system. First, it’s not necessary. Second, these tools can be used against you if a system is compromised. While this sentiment may have been expressed as a conditional, using the word if, you should always plan for your systems to be compromised. This means limiting what an attacker can do and what that person can get access to as well as giving yourself a lot of audit trails so you ...