SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe focus of this paper is to inform users of the practical and theoretical strategies that may be used in an attempt to compromise PGP (Pretty Good Privacy), potentially exposing the contents of a PGP encrypted message to an attacker. This paper will also recommend various countermeasures that can enhance a user's ability to defend themselves against some of the more realistic threats facing the use of Pretty Good Privacy. All countermeasures recommended in this paper may vary according to the specific system in place, the threat model associated with the organization and the level of sensitivity of the data being protected.