Performing a bounce attack to breach a network

You are using a binary file payload delivery from a FTP server during a bounce attack to breach a network.

Which of these logs would you modify/corrupt to stop the network administrator from identifying the source of the attack?

Options
  1. Crash Log
  2. Session Log
  3. Error Log
  4. None of these

Related Posts