Cleaning up compromised hosts

When dealing with a small network, it is easy to underestimate the time and effort it can take to clean up your compromised hosts. This task is critical in both avoiding detection and leaving the network in pristine condition once your testing has been completed. The last thing anyone wants is to overlook a compromised host that has a meterpreter backdoor installed and waiting for the next person to come along and take advantage of it! The key is to take meticulous notes and keep accurate records not only of what was done while testing, but also if the things that were done could possibly persist after testing.

Using a checklist

If you have not scripted the full exploitation and post-exploitation process, then make ...

Get Advanced Penetration Testing for Highly-Secured Environments - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.