Clearing tracks

This phase is used to clear all possible tracks of an intrusion on the target system and network; as a penetration tester, we like to be as stealthy as possible to simulate real-world attacks.

This phase has two objectives:

  • Clear all logs
  • Cover tracks