Cleaning up

  • Make the system as it was when you entered it

    • Remove executables, script and added files

    • Remove malware, rootkits, and added user accounts

    • Set settings back to original configurations

Resources

TCM Security Academy - Practical Ethical Hacking - The Complete Course

Last updated