Quote
Originally posted by Turbo:
**I'm doing the missions where you have to trace a programmer who has been hacking into a particular company...
They gave me level 3 access but I dont understand the point? Surely I would need admin access so I can look at the logs no?
So I hack in but I can't see any log that is close to the time/date that the company said they were hacked.??
Thanks!
Turbo
**
Keep in mind that another hacker may be using a log deleter or log modifier. The timestamp of the hack is often correct, and you will begin tracing the bounces the other hacker used. Use IP Lookup to add those sites to your map.
You will, of course, be hacking into the systems on the bounce route, so don't neglect your own security measures while hunting down the other guy.
Nick
------------------
"As long as men are free to ask what they must, free to say what they think, free to think what they will, freedom can never be lost, and science can never regress."
-- J. Robert Oppenheimer, American physicist (1904-1967)
(url="http://"http://www.501st.com")The 501st Stormtrooper Legion, 'Vader's Fist'(/url)