Комментарии:
After giving the command " shred - vfzu auth.log". It shows "Shred : auth log failed to open for writing: operation not permitted "
Kindly give the solution
the program shred the files, should have a amnesic part that forget how it had over write the file. kind of using rust or nim and no c or c++ that use other part of memory to do a new task.
Ответитьbut why not just put all to 1 or 0 . all. the file size.
ОтветитьI used covermyass from github...it did way more task than mentioned in video ....but server admin still know what I'm been doing ...maybe from last modification date
ОтветитьCheers Mate.
ОтветитьSince there is no Windows video yet, does anyone knows an alternative for windows machines?
ОтветитьHey Mr HackerSploit, thanks 👍
Much love from share
Очень много говорит и очень мало делает
ОтветитьALL INTEGRATED CIRCUTS SHOW TRACKS AND IS DOWNLOADABLE FOR USE IN ANY DIRECTION AND THEN IT'S ANALYZED FOR BEHAVIOR COOL RIGHT
ОтветитьThe best explanation and illustrations ever you are the world's best teacher
ОтветитьThe world's best teacher thanks
ОтветитьCan you make a video on how submit report after pent testing?
ОтветитьIf your on live os , this aint needed , anyway good informative vid !💯
ОтветитьHackersploit is best english hacking channel 😎
ОтветитьVery useful and awesome video
ОтветитьHow to clear ufw.log file, kern.log and syslog.
ОтветитьShredding important log files is not preventing the system to work as intended ?! Lets suppose i am pentesting a Linux Machine ,Is it not easier to backup all the log files at the exact moment when i log into the machine ,And after my changes in the FIlesystem ,I simply replaced the modified log files with the original one ? ( Ofc deleting the later generated entrys from the log files like auth.log and .bash_history , etc )
Ответитьgreat video ,thanks
Ответить5 minute only speak hmm
Ответитьyou are the best Linux teacher
ОтветитьWhat if we shred the entire log directory
Ответитьokay i agree about clearing logs and backdoors! but how if the forensics team recover all the deleted data over the device! its just an old trick now the nsa have a big technology helping them to finding the hackers like over communication gsm-line but if you hack the server and exploit the root privileges to editing the virtual ip it will be fine!
Ответитьwhy is the file renamed to 000000 then 00000 then 0000 then...
Ответитьmacos getting popular among pentesters?
could someone explain this
Does overwriting the file with null can't be recovered????
ОтветитьFor Windows also..
Ответитьwhat about journal logs? pretty important
ОтветитьI wonder what if the company actually pipes logs to another server, then stores them in a very unusual place with an unusual name
Ответитьso i have to shred all the file that have a .log in my linux to make it clean?
ОтветитьI appreciate the video sir alexis! :) how about tracks on the remote computer?
ОтветитьThis is actually important.
Ответитьthe best thing i should have learned for hacking practice. thank you so much for this tutorial you are doing a great work.
ОтветитьJust wow
ОтветитьCommand history is appended to the file whose path is stored in the variable "$HISTFILE", but only AFTER you have ended your session. HISTFILE is automatically set to ~/.bash_history for each new shell.
TL;DR
Just type HISTFILE=/dev/null when you're hacking and nothing will be saved in .bash_history
شرح اكثر من رائع :)
ОтветитьPlease do make the windows and macOS version next, it would be nice while the knowledge is fresh :-)
ОтветитьHow can I replace windows 10 with kali linux 2018.4 permanently help me plzz upload video
Ответить1.hey Hackersploit can you tell me something about this LAN tap all ATM machines are working on LAN is this possible to sniff ATM transaction
2. is that possible Hackers can intercept ATM machine that i am using for my transaction ???
Just a little tip for you : You can clear the console by pressing "CTRL+L", it's way faster than typing "clear<ENTER>"
ОтветитьHow can I done it in Android termux
Ответитьthank you
ОтветитьNice tutorial! Is it also valid for SSD?
ОтветитьThank you very much for making this video... i learned lot of things from this...
i hope & i wish that u will make sime informative on Cyber forensics in detail ...
Waiting for it...
PAX invictus , namaste !
ОтветитьI love your videos dude keep doing this you're awesome!
ОтветитьWe learned a lot, thanks
Ответить