Passwords - Attacks via Audit Trail
Jump to navigation
Jump to search
A record showing who has accessed a computer system and what operations he or she has performed during a given period of time.
This attack was possible on early unix systems, where all log files were readable for anyone.
Back (Attacks on Password Storage) | Table of Contents | Next (One-Way Encryption)