Quote:
Originally Posted by audio
On the host level, is there a way to detect attackers when they are in the limbo phase created by exploiting a service like that?
|
At the
host level:
- Application logging.
- Honeypot, perhaps?
At the network level you could employ a NIDS for early detection.