One of the most important aspects during a penetration test is to ensure there isn’t any trace of a compromise on the system. Like a hacker, your goal may be to compromise a target system or network, however, it is very important when terminating the connection or exiting the victim’s system that there isn’t any log or residual data left behind. Furthermore, during a penetration test, additional data may be generated that leaves a trace on the system and network.
In this chapter, we will be covering the following topics:
- Clearing logs on Windows
- Clearing logs on Linux
- Deleting files from the target
Let's dive In!