What is the hacker trying to accomplish here?

John is the network administrator of XSECURITY systems. His network was recently compromised. He analyzes the log files to investigate the attack. Take a look at the following Linux log file snippet. The hacker compromised and "owned" a Linux machine. What is the hacker trying to accomplish here?
(exhibit)

John is the network administrator of XSECURITY systems. His network was recently compromised. He analyzes the log files to investigate the attack. Take a look at the following Linux log file snippet. The hacker compromised and “owned” a Linux machine. What is the hacker trying to accomplish here?

A.
The hacker is attempting to compromise more machines on the network

B.
The hacker is planting a rootkit

C.
The hacker is running a buffer overflow exploit to lock down the system

D.
The hacker is trying to cover his tracks

Explanation:
By deleting temporary directories and emptying like bash_history that contains the last commands used with the bash shell he is trying to cover his tracks.



Leave a Reply 1

Your email address will not be published. Required fields are marked *