In this chapter, we discussed some techniques that a penetration tester can use to avoid detection, such as spoofing MAC addresses and scanning targets while not revealing our true identity. However, a penetration tester should not limit themself to only using the techniques and methods mentioned in this chapter. The great thing about being a cybersecurity professional in the field of penetration testing is the limitless number of ways an attacker can attempt to be stealthy.
In the next chapter, we will cover hardening techniques and countermeasures. There, you will learn how to secure the Windows, Linux, and Mobile operating systems.