We are now done with the chapter, so let us recap. Since we completed all the penetration tests that were required for our engagement, we need to make sure that we clean up any mess we made, just like our mothers have taught us. It is important as professionals to make sure that we leave the environment the same as it was before we started and leave no tracks behind. To accomplish this, we talked about various items that we should be certain get done, basically, a cleaning-up list. To accomplish this, we talked about utilities to hide our tracks, for example, shred, dd, ClearLogs, and cleanev. They all have various specialties on where and when to use and all of them should be in the penetration tester's toolbox.
Next, since physical destruction may be necessary depending on the stakeholders' requirement and/or data sensitivity level, we talked about the various...