Premium Resources
Free Resources
Covering Tracks
Once an attacker finishes his work, he wants to erase all tracks leading the investigators tracing back to him. This can be done using
-
Disable auditing.
-
Clearing logs.
-
Modifying logs, registry files.
-
Removing all files, folders created.