Who Uses Covert Channels? Cracker who has breached your systems: Download tools from outside Upload internal data to outside Create virtual network to outside machine Communicate to outside parties
Copyright 2003, Bri Hatch of Onsight, Inc.
Presented at SecureWorld Expo, 2003.
Presentation created using vim and MagicPoint.