In this chapter, we discussed ways of being stealthy during a penetration test, while simulating attacks on a targeted system and network. We discussed various types of logs and their locations. Further, we looked at a few scenarios where we used various techniques to clear logs on both Windows and Linux operating systems.
In the next chapter, we will cover Packet Sniffing and Traffic Analysis. We'll use different techniques to capture traffic and conduct analysis using various tools to obtain confidential information.