- Steal credentials from browser and system.
- Spread to other systems using psexec and WMI tools.
- First delete all shadow copies of files and windows backup catalogs.
- Turn off recovery mode.
- Delete system logs.
This will cover tracks and making difficult to recover
No comments:
Post a Comment