Attack Phase 5: Post-attack activity

CS 493/693 Lecture, Dr. Lawlor, 2006/02/15

Once an attacker has gained root or Administrator access, the machine is now theirs to use as they please. A machine provides a variety of resources that are useful to hackers: Sadly, many compromises are only detected at this phase--when a machine saturates its network connection sending out spam or viruses. A huge number of "quietly" compromised machine exist, just waiting for the network command that will cause them to spring to life. An array of these on-call quietly compromised machines is called a "botnet" or "zombie army".