When using programs such as ping and some of the scanning tools to do forensic investigations, we may easily tip off the suspect that is under investigation. If a clever attacker suspects that he/she is being tracked, the attacker will try to cover their tracks. Discuss the investigative techniques in these scenarios.
Tips
like how do you evade him not to know you are on his tails, and what technique you will use including tools.