Hide your tracks

Noted methods used by hackers to hide their tracks:

  • Encrypt keystrokes with tools such as Keyscrambler to prevent a keylogger from recording their IP address, Mac address, open ports, operating system, installed applications, default web browser, visited URLs, making screenshots …

  • Create a locked screen saver to prevent live forensics

  • Disable hibernation

  • Disable and remove USB logs

  • Disable time stamps

  • Disable System Restore Points (Windows)

  • Disable Debugging Upon Failure (Windows)

  • Disable Event Logging (Windows)

  • Disable sending error reports to third parties.

  • Hide encrypted files in an encrypted container on a USB stick.

  • Use SSH (Secure Shell) when connecting to a remote system.

  • Use high anonymity proxies and VPN’s that do not log.

  • Chain multiple proxies or chain VPN’s or use a VPN together with a high-anonymity proxy for an increased privacy advantage.

  • Spoof and mimic a user-agent to hide the browsers’ identification.

  • Destroy or alter audit trails to hide tracks of having been on a target.

  • After a hack, delete any wireless network keys or passphrases, network share passwords and passwords for VPN or dial-up.

  • After a hack, shred all related data, delete the entire hard drive, and install a fresh operating system from bootable disc or USB drive (erase and format the drive’s partitions) to return to normal function.

  • Learn about Digital Forensics, keep up to date.