From the course: Ethical Hacking: System Hacking
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Outlining ways to cover your tracks
From the course: Ethical Hacking: System Hacking
Outlining ways to cover your tracks
- [Instructor] After achieving and maintaining access, it's time to exit the system. In this segment, we'll discover some of the ways to clean up evidence and cover any tracks or traces of activity on a Linux or Windows machine. Now, once the pen test is complete, the team will need to properly exit the system. Commonly referred to as the cleanup phase, this step involves removing any trace of activity, eliminating tools and artifacts, disabling accounts, and restoring configurations. Completing these steps will preserve the integrity of the system and ensure that no back doors or vulnerabilities remain that could be exploited by a malicious actor. So let's talk about what you'll need to do during this phase. You'll need to remove all artifacts related to the pen test. You should clear any event logs, remove files and directories, kill any processes that were started during your session, clean up registry modifications, and close any network connections made, such as reverse shells…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.