GreyCampus Logo

About

Contact


Premium Resources
Training Courses
Free Resources
Open CampusBlogMock ExamsDownloadables

Covering Tracks | Ethical Hacking


Covering Tracks



Once an attacker finishes his work, he wants to erase all tracks leading the investigators tracing back to him. This can be done using



  1. Disable auditing.


  2. Clearing logs.


  3. Modifying logs, registry files.


  4. Removing all files, folders created.






GreyCampus Logo

Company
AboutContactTerms of UsePrivacy Policy
Bootcamps
Data Science CoursePower BI CourseApplied Generative AI CourseCertificate Program in Data Science and Machine Learning