If we think about it, the primary objective of any penetration test is to get in, get out, and in the case of black box tests, do so unnoticed with all the information we need. The topics in this chapter are vital to any successful penetration test, and much like the earlier phases, we need to practice and plan. In this chapter, we focused on different ways to cover our tracks, such as using proxies and anonymous sites to hide our identity, as well as corrupting or destroying our machines to render them useless or destroy evidence. They all play an important role in making sure there are no breadcrumbs left behind.
Lastly, we focused on documentation. Developing reports allows us to document our findings for later use, and not have to repeat any of the other steps in the Kill Chain. We showed some good tools for harvesting and backhauling traffic to our friendly C&C server to help flesh out our report. From taking screenshots to moving files, understanding how to use these tools...