How To Clear Tracks & Logs On Linux

How To Clear Tracks & Logs On Linux

HackerSploit

5 лет назад

62,161 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@deepakgulia3863
@deepakgulia3863 - 25.10.2023 21:21

After giving the command " shred - vfzu auth.log". It shows "Shred : auth log failed to open for writing: operation not permitted "
Kindly give the solution

Ответить
@Torterra_ghahhyhiHd
@Torterra_ghahhyhiHd - 01.07.2023 08:09

the program shred the files, should have a amnesic part that forget how it had over write the file. kind of using rust or nim and no c or c++ that use other part of memory to do a new task.

Ответить
@Torterra_ghahhyhiHd
@Torterra_ghahhyhiHd - 01.07.2023 08:06

but why not just put all to 1 or 0 . all. the file size.

Ответить
@ruslanefendi123
@ruslanefendi123 - 26.04.2023 04:56

I used covermyass from github...it did way more task than mentioned in video ....but server admin still know what I'm been doing ...maybe from last modification date

Ответить
@refaiabdeen5943
@refaiabdeen5943 - 01.01.2023 05:01

Cheers Mate.

Ответить
@GodotEnjoyer
@GodotEnjoyer - 03.10.2022 00:29

Since there is no Windows video yet, does anyone knows an alternative for windows machines?

Ответить
@droidhackerr
@droidhackerr - 07.06.2022 18:37

Hey Mr HackerSploit, thanks 👍

Much love from share

Ответить
@welcometohe1l
@welcometohe1l - 28.11.2021 21:11

Очень много говорит и очень мало делает

Ответить
@christinadeswood3999
@christinadeswood3999 - 24.11.2021 15:07

ALL INTEGRATED CIRCUTS SHOW TRACKS AND IS DOWNLOADABLE FOR USE IN ANY DIRECTION AND THEN IT'S ANALYZED FOR BEHAVIOR COOL RIGHT

Ответить
@kabandajamir9844
@kabandajamir9844 - 06.11.2021 13:10

The best explanation and illustrations ever you are the world's best teacher

Ответить
@kabandajamir9844
@kabandajamir9844 - 06.11.2021 12:58

The world's best teacher thanks

Ответить
@qani613
@qani613 - 01.10.2021 02:48

Can you make a video on how submit report after pent testing?

Ответить
@8080VB
@8080VB - 05.06.2021 12:20

If your on live os , this aint needed , anyway good informative vid !💯

Ответить
@agents_of_hydra1859
@agents_of_hydra1859 - 17.04.2021 13:27

Hackersploit is best english hacking channel 😎

Ответить
@agents_of_hydra1859
@agents_of_hydra1859 - 17.04.2021 13:27

Very useful and awesome video

Ответить
@joaorachao4602
@joaorachao4602 - 09.04.2021 01:43

How to clear ufw.log file, kern.log and syslog.

Ответить
@peterbertalan1684
@peterbertalan1684 - 17.03.2021 06:57

Shredding important log files is not preventing the system to work as intended ?! Lets suppose i am pentesting a Linux Machine ,Is it not easier to backup all the log files at the exact moment when i log into the machine ,And after my changes in the FIlesystem ,I simply replaced the modified log files with the original one ? ( Ofc deleting the later generated entrys from the log files like auth.log and .bash_history , etc )

Ответить
@yigitaktas715
@yigitaktas715 - 28.02.2021 21:14

great video ,thanks

Ответить
@muhammadasymawi6359
@muhammadasymawi6359 - 30.01.2021 11:13

5 minute only speak hmm

Ответить
@arshamrezaei4253
@arshamrezaei4253 - 29.01.2021 20:02

you are the best Linux teacher

Ответить
@HG-vu6ux
@HG-vu6ux - 21.01.2021 09:01

What if we shred the entire log directory

Ответить
@detective5253
@detective5253 - 17.10.2020 04:20

okay i agree about clearing logs and backdoors! but how if the forensics team recover all the deleted data over the device! its just an old trick now the nsa have a big technology helping them to finding the hackers like over communication gsm-line but if you hack the server and exploit the root privileges to editing the virtual ip it will be fine!

Ответить
@jiangyi19850130
@jiangyi19850130 - 08.10.2020 20:42

why is the file renamed to 000000 then 00000 then 0000 then...

Ответить
@AbdulKalam-kq3fl
@AbdulKalam-kq3fl - 10.09.2020 10:49

macos getting popular among pentesters?
could someone explain this

Ответить
@anupamjaiswal7714
@anupamjaiswal7714 - 14.07.2020 06:24

Does overwriting the file with null can't be recovered????

Ответить
@salokyakumar
@salokyakumar - 03.05.2020 18:02

For Windows also..

Ответить
@IT-py9tu
@IT-py9tu - 21.12.2019 13:33

what about journal logs? pretty important

Ответить
@wiredelectrosphere
@wiredelectrosphere - 14.07.2019 22:01

I wonder what if the company actually pipes logs to another server, then stores them in a very unusual place with an unusual name

Ответить
@rrmusic970
@rrmusic970 - 15.05.2019 11:05

so i have to shred all the file that have a .log in my linux to make it clean?

Ответить
@rawkstar952
@rawkstar952 - 06.05.2019 08:56

I appreciate the video sir alexis! :) how about tracks on the remote computer?

Ответить
@zawmin470
@zawmin470 - 09.04.2019 02:30

This is actually important.

Ответить
@ymk24
@ymk24 - 07.04.2019 18:56

the best thing i should have learned for hacking practice. thank you so much for this tutorial you are doing a great work.

Ответить
@zawmin470
@zawmin470 - 23.03.2019 23:25

Just wow

Ответить
@donesitackacom
@donesitackacom - 08.03.2019 03:42

Command history is appended to the file whose path is stored in the variable "$HISTFILE", but only AFTER you have ended your session. HISTFILE is automatically set to ~/.bash_history for each new shell.

TL;DR
Just type HISTFILE=/dev/null when you're hacking and nothing will be saved in .bash_history

Ответить
@AhmedMohamed-xs5ij
@AhmedMohamed-xs5ij - 01.03.2019 23:34

شرح اكثر من رائع :)

Ответить
@mentalimage4140
@mentalimage4140 - 01.03.2019 15:16

Please do make the windows and macOS version next, it would be nice while the knowledge is fresh :-)

Ответить
@sakshamsharma8395
@sakshamsharma8395 - 28.02.2019 15:47

How can I replace windows 10 with kali linux 2018.4 permanently help me plzz upload video

Ответить
@jagsirsingh2179
@jagsirsingh2179 - 27.02.2019 07:40

1.hey Hackersploit can you tell me something about this LAN tap all ATM machines are working on LAN is this possible to sniff ATM transaction
2. is that possible Hackers can intercept ATM machine that i am using for my transaction ???

Ответить
@sWi5s
@sWi5s - 26.02.2019 20:48

Just a little tip for you : You can clear the console by pressing "CTRL+L", it's way faster than typing "clear<ENTER>"

Ответить
@vigneshwarsj6236
@vigneshwarsj6236 - 25.02.2019 17:15

How can I done it in Android termux

Ответить
@chandrahasan9845
@chandrahasan9845 - 25.02.2019 13:07

thank you

Ответить
@cagatayodabasi
@cagatayodabasi - 25.02.2019 12:25

Nice tutorial! Is it also valid for SSD?

Ответить
@e1Pr0f3ss0r
@e1Pr0f3ss0r - 25.02.2019 12:18

Thank you very much for making this video... i learned lot of things from this...
i hope & i wish that u will make sime informative on Cyber forensics in detail ...
Waiting for it...

Ответить
@pidkarpe
@pidkarpe - 25.02.2019 10:29

PAX invictus , namaste !

Ответить
@slicy9318
@slicy9318 - 25.02.2019 08:02

I love your videos dude keep doing this you're awesome!

Ответить
@isectech
@isectech - 25.02.2019 05:32

We learned a lot, thanks

Ответить