I am currently working on a project that involves attempting to exploit a target system running Windows XP SP2, and then attacking another system through said system, and then removing all trace that the first attack occurred, essentially remaining undetectable. My question is this possible?
I only have spent about a month learning to hack so I do not know all of the tricks that can be used. but so far I have concluded that short of physically gaining access to the other system (via breaking in and using the computer to hack) that it is impossible to be completely undetectable.
The Vulnerability I am using is the MS08-067 vulnerability, and I will attempt to deliver the payload via a dll injection or a shell (if I can delete logs of the new process being made), and keep the entire attack in RAM, avoiding any disk changes that can be investigated. I will also be conscious of slack space etc. and considered powering down the victim machine after the attack to avoid the RAM persisting.
If anyone has any information on whether it is in fact possible to attack a system, delete all logs of the connection occurring etc. I would be grateful.
Thanks.
STAFF NOTE: fixed the font size cause it was hard to read