Take Advantage of Anti-Forensic Techniques
Learn about a variety of anti-forensic techniques that attackers might potentially use against your network: Use meterpreter to create files, modify file timestamps, and clear Windows event logs; Use meterpreter to impersonate an administrator, plant false evidence in Windows event logs, and remotely reboot a Windows system; and hide files by using New Technology File System (NTFS) alternate data streams (ADS).

Overview
Learn about a variety of anti-forensic techniques that attackers might potentially use against your network: Use meterpreter to create files, modify file timestamps, and clear Windows event logs; Use meterpreter to impersonate an administrator, plant false evidence in Windows event logs, and remotely reboot a Windows system; and hide files by using New Technology File System (NTFS) alternate data streams (ADS).
