From a penetration tester perspective

  • Make the system/network as it was when you entered it
    • Remove executables, scripts, and added files
    • Remove malware, rootkits, and added user accounts
    • Set settings back to original configurations