Passwords - Attacks via Audit Trail

From
Jump to navigation Jump to search

A record showing who has accessed a computer system and what operations he or she has performed during a given period of time.

This attack was possible on early unix systems, where all log files were readable for anyone.


Back (Attacks on Password Storage) | Table of Contents | Next (One-Way Encryption)