Removing shells:Remove any shell programs installed when performing the pentest. Removing tester-created credentials:Be sure to remove any user accounts created during the pentest. This includes backdoor accounts. Removing tools: Remove any software tools that were installed on the customer's systems that were used to aid in the exploitation of systems.