O'Reilly logo

Learning Metasploit Exploitation and Development by Aditya Balapure

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Post Exploitation – Cleaning Up Traces

We covered the privilege escalation techniques using Metasploit in the previous chapter. Next, we move on to the next phase of post exploitation, which is cleaning tracks and traces through log deletion and staying undetected by disabling the firewall and antivirus systems. In this chapter we will learn how to evade firewall and antivirus system alerts once a system is compromised. Another important matter for a hacker is how invisibly he performs his work. This is known as cleaning tracks and traces; here, a malicious hacker clears logs and any alerts that may have been created because of his intrusion.

Disabling firewalls and other network defenses

Why is a firewall important? A firewall is basically ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required