From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Outlining ways to cover your tracks

Outlining ways to cover your tracks

From the course: Ethical Hacking: System Hacking

Outlining ways to cover your tracks

- [Instructor] After achieving and maintaining access, it's time to exit the system. In this segment, we'll discover some of the ways to clean up evidence and cover any tracks or traces of activity on a Linux or Windows machine. Now, once the pen test is complete, the team will need to properly exit the system. Commonly referred to as the cleanup phase, this step involves removing any trace of activity, eliminating tools and artifacts, disabling accounts, and restoring configurations. Completing these steps will preserve the integrity of the system and ensure that no back doors or vulnerabilities remain that could be exploited by a malicious actor. So let's talk about what you'll need to do during this phase. You'll need to remove all artifacts related to the pen test. You should clear any event logs, remove files and directories, kill any processes that were started during your session, clean up registry modifications, and close any network connections made, such as reverse shells…

Contents