I know how to use history commands to clear it, but I want the whole video where I could find those logs in order to clear my trace, and you did a great job and exceeded our expectations!
Thank you very much for making this video... i learned lot of things from this... i hope & i wish that u will make sime informative on Cyber forensics in detail ... Waiting for it...
Command history is appended to the file whose path is stored in the variable "$HISTFILE", but only AFTER you have ended your session. HISTFILE is automatically set to ~/.bash_history for each new shell. TL;DR Just type HISTFILE=/dev/null when you're hacking and nothing will be saved in .bash_history
In Arch Linux, the directory /var/log/journal/ is a part of the systemd package, and the journal (when Storage= is set to auto in /etc/systemd/journald.conf) will write to /var/log/journal/. If that directory is deleted, systemd will not recreate it automatically and instead will write its logs to /run/systemd/journal in a nonpersistent way. However, the folder will be recreated if Storage=persistent is added to journald.conf and systemd-journald.service (the logging service) is restarted (or the system is rebooted). (Directly from archlinux wiki) and on other systems which logging is a service stackoverflow.com/questions/17358499/linux-how-to-disable-all-log read this. But I don't know how reliable is this method.
Clearing logs 99% of times is not allowed in a pentest since if there is a real attacker his defense can argue that logs are admissible since the company pentester or third party pentester tempered with logs also the use of rootkits and code injection in product source code since it has major impact so pentestos always limited somehow and before you go clear logs be 100% you have permission written permission since it's not a joke
Shredding important log files is not preventing the system to work as intended ?! Lets suppose i am pentesting a Linux Machine ,Is it not easier to backup all the log files at the exact moment when i log into the machine ,And after my changes in the FIlesystem ,I simply replaced the modified log files with the original one ? ( Ofc deleting the later generated entrys from the log files like auth.log and .bash_history , etc )
I know this is easy to over look but shred relies on an important assumption. That is, A file system overwrites the data in place which isn't the case in all of the present day file systems(Xfs , ext3 or raid-based file systems in some case's) Just a heads up for someone who is going to try this.
1.hey Hackersploit can you tell me something about this LAN tap all ATM machines are working on LAN is this possible to sniff ATM transaction 2. is that possible Hackers can intercept ATM machine that i am using for my transaction ???
the program shred the files, should have a amnesic part that forget how it had over write the file. kind of using rust or nim and no c or c++ that use other part of memory to do a new task.
After giving the command " shred - vfzu auth.log". It shows "Shred : auth log failed to open for writing: operation not permitted " Kindly give the solution
okay i agree about clearing logs and backdoors! but how if the forensics team recover all the deleted data over the device! its just an old trick now the nsa have a big technology helping them to finding the hackers like over communication gsm-line but if you hack the server and exploit the root privileges to editing the virtual ip it will be fine!
Plz help me , i have a problem , when i use python for cupp.py , error and say : File cupp.py, line 40, in import urllib.error import error : no module named error , help me plz
It is creating multiple overwriting with random 1s and 0s in other to get rid of the file. More of writing 20 words on a tiny piece of paper to overwrite the previous.
Some of the stuff seen in these videos can be done on Windows, but you'd probably have better luck in a Linux environment. I'd recommend installing Linux in a Virtual Machine if you're able to. It won't cost you any money, and you won't need to get rid of Windows ether. You'll have a way better time following along with these videos if you do.