CHAPTER 12 Covering Your Tracks and Evading Detection

We’ve done quite a bit of work so far, but now it is time to clean up our mess and smooth things over. The actions we have undertaken and applications we have used so far can easily leave behind evidence on a system that could be used to reveal the mischief that you have been performing. We want to make sure that, when we start poking around, exploring, and leaving stuff behind, suspicions are not aroused and our actions remain secret and hidden as long as is possible—at least until meeting with the client to give them a report on the results of the penetration test.

In this chapter, you’ll learn to

  • Know why you need to remove evidence
  • Remove events from log files
  • Purge and remove events ...

Get Penetration Testing Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.