Get started

By signing up, you agree to our Terms of Use and Privacy Policy.
Reset your password
Enter your email and we'll send you instructions on how to reset your password.

Covering Tracks

Once an attacker finishes his work, he wants to erase all tracks leading the investigators tracing back to him. This can be done using

  1. Disable auditing.

  2. Clearing logs.

  3. Modifying logs, registry files.

  4. Removing all files, folders created.


0 Comments

Add Comment

Subject to Moderate