Explanation Removing shells: Remove any shell programs installed when performing the pentest. Removing tester-created credentials: created during the pentest. This includes backdoor accounts. Removing tools: Remove any software tools that were installed on the customer's systems that were used to aid in the exploitation of systems.