Тёмный

How To Clear Tracks & Logs On Linux 

HackerSploit
Подписаться 941 тыс.
Просмотров 63 тыс.
50% 1

Опубликовано:

 

4 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 112   
@sWi5s
@sWi5s 5 лет назад
Just a little tip for you : You can clear the console by pressing "CTRL+L", it's way faster than typing "clear"
@nawid1687
@nawid1687 3 года назад
Sorry I'm 2 years late but CTRL+L won't clear
@sWi5s
@sWi5s 3 года назад
@@nawid1687 what console are you using?
@nawid1687
@nawid1687 3 года назад
@@sWi5s Tmux, No I mean you feel like that it clears the screen but all the information is still up there
@sWi5s
@sWi5s 3 года назад
@@nawid1687 yep it doesn't work in tmux.
@sulochanakharat9033
@sulochanakharat9033 3 года назад
thanks
@hewfrebie2597
@hewfrebie2597 5 лет назад
I know how to use history commands to clear it, but I want the whole video where I could find those logs in order to clear my trace, and you did a great job and exceeded our expectations!
@kabandajamir9844
@kabandajamir9844 2 года назад
The best explanation and illustrations ever you are the world's best teacher
@wiredelectrosphere
@wiredelectrosphere 5 лет назад
I wonder what if the company actually pipes logs to another server, then stores them in a very unusual place with an unusual name
@chowadagod
@chowadagod 5 лет назад
Been pondering about this like forever .. 👌. U a life saver
@arshamrezaei4253
@arshamrezaei4253 3 года назад
you are the best Linux teacher
@kabandajamir9844
@kabandajamir9844 2 года назад
The world's best teacher thanks
@ronakrawal8325
@ronakrawal8325 5 лет назад
Sir Make Series On Forensic Investigation.
@peesicle
@peesicle 3 года назад
sir can you please tell me why everyone here with a foreign name says sir?
@nyser703
@nyser703 7 месяцев назад
Thank you Mr H.S for making this video
@moneymac1114
@moneymac1114 6 месяцев назад
Great video with great easy to understand explanations !
@e1Pr0f3ss0r
@e1Pr0f3ss0r 5 лет назад
Thank you very much for making this video... i learned lot of things from this... i hope & i wish that u will make sime informative on Cyber forensics in detail ... Waiting for it...
@tecnolinux1469
@tecnolinux1469 5 лет назад
Thanks for refreshing my mind with the commands on the video Do you have a video starting in ethical hacking?
@donesitackacom
@donesitackacom 5 лет назад
Command history is appended to the file whose path is stored in the variable "$HISTFILE", but only AFTER you have ended your session. HISTFILE is automatically set to ~/.bash_history for each new shell. TL;DR Just type HISTFILE=/dev/null when you're hacking and nothing will be saved in .bash_history
@samtheharvester6188
@samtheharvester6188 3 года назад
clever
@ymk24
@ymk24 5 лет назад
the best thing i should have learned for hacking practice. thank you so much for this tutorial you are doing a great work.
@JatinYadav1307
@JatinYadav1307 5 лет назад
I was actually waiting for a tutorial on clearing logs as nothing good was available online.
@rawkstar952
@rawkstar952 5 лет назад
I appreciate the video sir alexis! :) how about tracks on the remote computer?
@melvinjaltsater
@melvinjaltsater 5 лет назад
Do the windows one, it's going to be fun to learn
@droidhackerr
@droidhackerr 2 года назад
Hey Mr HackerSploit, thanks 👍 Much love from share
@siddharthtadury5612
@siddharthtadury5612 5 лет назад
I Love each and every video you make. You are wiki to me,Thank a lot.!!
@AhmedMohamed-xs5ij
@AhmedMohamed-xs5ij 5 лет назад
شرح اكثر من رائع :)
@darrylmusashi6352
@darrylmusashi6352 5 лет назад
Is there a way to prevent these logs from being stored in the first place?
@pythontutor9069
@pythontutor9069 4 года назад
In Arch Linux, the directory /var/log/journal/ is a part of the systemd package, and the journal (when Storage= is set to auto in /etc/systemd/journald.conf) will write to /var/log/journal/. If that directory is deleted, systemd will not recreate it automatically and instead will write its logs to /run/systemd/journal in a nonpersistent way. However, the folder will be recreated if Storage=persistent is added to journald.conf and systemd-journald.service (the logging service) is restarted (or the system is rebooted). (Directly from archlinux wiki) and on other systems which logging is a service stackoverflow.com/questions/17358499/linux-how-to-disable-all-log read this. But I don't know how reliable is this method.
@agents_of_hydra1859
@agents_of_hydra1859 3 года назад
Hackersploit is best english hacking channel 😎
@zawmin470
@zawmin470 5 лет назад
This is actually important.
@alexanderparvanov815
@alexanderparvanov815 5 лет назад
What happened with the evil twin second video?
@llellouche
@llellouche 5 лет назад
Clearing logs 99% of times is not allowed in a pentest since if there is a real attacker his defense can argue that logs are admissible since the company pentester or third party pentester tempered with logs also the use of rootkits and code injection in product source code since it has major impact so pentestos always limited somehow and before you go clear logs be 100% you have permission written permission since it's not a joke
@bisaum12
@bisaum12 4 года назад
Next time, use commas.
@bisaum12
@bisaum12 4 года назад
Not using commas creates an unnecessary mental overhead for people trying to understand you.
@zyan983
@zyan983 4 года назад
This is for both pentesters and people who just want to mess around with cybersecurity.
@llellouche
@llellouche 4 года назад
I apologise for not using commas, you are absolutely right.
@qani613
@qani613 3 года назад
Can you make a video on how submit report after pent testing?
@peterbertalan1684
@peterbertalan1684 3 года назад
Shredding important log files is not preventing the system to work as intended ?! Lets suppose i am pentesting a Linux Machine ,Is it not easier to backup all the log files at the exact moment when i log into the machine ,And after my changes in the FIlesystem ,I simply replaced the modified log files with the original one ? ( Ofc deleting the later generated entrys from the log files like auth.log and .bash_history , etc )
@samtheharvester6188
@samtheharvester6188 3 года назад
This is actually a clever idea
@mentalimage4140
@mentalimage4140 5 лет назад
Please do make the windows and macOS version next, it would be nice while the knowledge is fresh :-)
@yashwanth_guduru
@yashwanth_guduru 5 лет назад
I know this is easy to over look but shred relies on an important assumption. That is, A file system overwrites the data in place which isn't the case in all of the present day file systems(Xfs , ext3 or raid-based file systems in some case's) Just a heads up for someone who is going to try this.
@sohailsaha7427
@sohailsaha7427 4 года назад
Can you explain please? Also, what would be a better alternative?
@slicy9318
@slicy9318 5 лет назад
I love your videos dude keep doing this you're awesome!
@florian2119
@florian2119 5 лет назад
Thanks vety useful
@jagsirsingh2179
@jagsirsingh2179 5 лет назад
1.hey Hackersploit can you tell me something about this LAN tap all ATM machines are working on LAN is this possible to sniff ATM transaction 2. is that possible Hackers can intercept ATM machine that i am using for my transaction ???
@Retr0Kid
@Retr0Kid 5 лет назад
Great video as always H.S, thanks again!
@refaiabdeen5943
@refaiabdeen5943 Год назад
Cheers Mate.
@Torterra_ghahhyhiHd
@Torterra_ghahhyhiHd Год назад
the program shred the files, should have a amnesic part that forget how it had over write the file. kind of using rust or nim and no c or c++ that use other part of memory to do a new task.
@agents_of_hydra1859
@agents_of_hydra1859 3 года назад
Very useful and awesome video
@christinadeswood3999
@christinadeswood3999 2 года назад
ALL INTEGRATED CIRCUTS SHOW TRACKS AND IS DOWNLOADABLE FOR USE IN ANY DIRECTION AND THEN IT'S ANALYZED FOR BEHAVIOR COOL RIGHT
@wolfpoker
@wolfpoker 5 лет назад
Great vid but my eyes went straight to one of your tags "Foresnics" :P
5 лет назад
Nice tutorial! Is it also valid for SSD?
@ivan6navi
@ivan6navi 5 лет назад
Yes.
@yigitaktas715
@yigitaktas715 3 года назад
great video ,thanks
@isectech
@isectech 5 лет назад
We learned a lot, thanks
@joaorachao4602
@joaorachao4602 3 года назад
How to clear ufw.log file, kern.log and syslog.
@aakashchandrakar6359
@aakashchandrakar6359 5 лет назад
make video SS7
@hewfrebie2597
@hewfrebie2597 5 лет назад
When are you going to explain about why you use Linux since you've said before beginning a netstat tutorial commands.
@iakashx
@iakashx 5 лет назад
Oh man..!! That's alot. ✊✊Thank you.!
@chandrahasan9845
@chandrahasan9845 5 лет назад
thank you
@IT-py9tu
@IT-py9tu 4 года назад
what about journal logs? pretty important
@deepakgulia3863
@deepakgulia3863 11 месяцев назад
After giving the command " shred - vfzu auth.log". It shows "Shred : auth log failed to open for writing: operation not permitted " Kindly give the solution
@GodotEnjoyer
@GodotEnjoyer 2 года назад
Since there is no Windows video yet, does anyone knows an alternative for windows machines?
@alimujtaba9063
@alimujtaba9063 3 года назад
Starts from 4:44
@francescopresta9570
@francescopresta9570 5 лет назад
Excellent!
@anupamjaiswal7714
@anupamjaiswal7714 4 года назад
Does overwriting the file with null can't be recovered????
@8080VB
@8080VB 3 года назад
If your on live os , this aint needed , anyway good informative vid !💯
@pidkarpe
@pidkarpe 5 лет назад
PAX invictus , namaste !
@rrmusic970
@rrmusic970 5 лет назад
so i have to shred all the file that have a .log in my linux to make it clean?
@Torterra_ghahhyhiHd
@Torterra_ghahhyhiHd Год назад
but why not just put all to 1 or 0 . all. the file size.
@detective5253
@detective5253 4 года назад
okay i agree about clearing logs and backdoors! but how if the forensics team recover all the deleted data over the device! its just an old trick now the nsa have a big technology helping them to finding the hackers like over communication gsm-line but if you hack the server and exploit the root privileges to editing the virtual ip it will be fine!
@majestinostario1341
@majestinostario1341 2 года назад
Gracias!
@zawmin470
@zawmin470 5 лет назад
Just wow
@MrGFYne1337357
@MrGFYne1337357 5 лет назад
#NOTIFICATIONSQUAD
@cyber222
@cyber222 5 лет назад
Great
@vigneshwarsj6236
@vigneshwarsj6236 5 лет назад
How can I done it in Android termux
@sohaibmhariri6810
@sohaibmhariri6810 5 лет назад
Plz help me , i have a problem , when i use python for cupp.py , error and say : File cupp.py, line 40, in import urllib.error import error : no module named error , help me plz
@chodetode7419
@chodetode7419 5 лет назад
If you're using Python3 make sure you have pip installed and try running "pip3 install urllib3". Then try and run cuppy.py again.
@AbdulKalam-kq3fl
@AbdulKalam-kq3fl 4 года назад
macos getting popular among pentesters? could someone explain this
@peesicle
@peesicle 3 года назад
Mac os? where?
@sakshamsharma8395
@sakshamsharma8395 5 лет назад
How can I replace windows 10 with kali linux 2018.4 permanently help me plzz upload video
@peesicle
@peesicle 3 года назад
if you don't know how to do that don't even get Kali
@salokyakumar
@salokyakumar 4 года назад
For Windows also..
@jagannathpanigrahi2828
@jagannathpanigrahi2828 5 лет назад
Hey Alexis , Please make videos with white terminal..Finding it difficult to watch.
@jiangyi19850130
@jiangyi19850130 4 года назад
why is the file renamed to 000000 then 00000 then 0000 then...
@droidhackerr
@droidhackerr 2 года назад
It is creating multiple overwriting with random 1s and 0s in other to get rid of the file. More of writing 20 words on a tiny piece of paper to overwrite the previous.
@jiangyi19850130
@jiangyi19850130 2 года назад
At that point I guess the content of the file (data block) is already overwritten. It's just overwriting the name of the file in disk index block.
@droidhackerr
@droidhackerr 2 года назад
@@jiangyi19850130 probably, but am also not sure about that
@waiwai4480
@waiwai4480 5 лет назад
is every site vulnerable for sql injection or not ??
@sdadi9170
@sdadi9170 5 лет назад
No
@waiwai4480
@waiwai4480 5 лет назад
Sufian Dadiani how can you be sure ?
@sdadi9170
@sdadi9170 5 лет назад
Because i pentest and ive tried before
@waiwai4480
@waiwai4480 5 лет назад
Sufian Dadiani are you a pentester ?
@waiwai4480
@waiwai4480 5 лет назад
plushoom what attacks are used by hacker nowadays for accesing database ? can you list them ?
@SaurabhSharma-ip9kw
@SaurabhSharma-ip9kw 5 лет назад
How to do on windows 10 ??
@chodetode7419
@chodetode7419 5 лет назад
Some of the stuff seen in these videos can be done on Windows, but you'd probably have better luck in a Linux environment. I'd recommend installing Linux in a Virtual Machine if you're able to. It won't cost you any money, and you won't need to get rid of Windows ether. You'll have a way better time following along with these videos if you do.
@MedD0c
@MedD0c 5 лет назад
Windows is calling home in real time once having network. Not possible
@yyaaooww
@yyaaooww 2 года назад
Очень много говорит и очень мало делает
@muhammadasymawi6359
@muhammadasymawi6359 3 года назад
5 minute only speak hmm
@punyasiapa1952
@punyasiapa1952 5 лет назад
#02Presiden_RI1 #INAelectionObserverSOS #IndonesiaCallsCarterCenter #INAelectionObserverSOS90TURKI #CYBERMUSLIMRUSSIANFORPRABOWOSOS​
@mrsmith4534
@mrsmith4534 5 лет назад
YOU SHOULD REALLY PLAY PUBG
@zyan983
@zyan983 4 года назад
No just no.
@rukoray3920
@rukoray3920 5 лет назад
#NOTIFICATIONSQUAD
@rukoray3920
@rukoray3920 5 лет назад
In India it takes 30,000 rupees to learn ethical hacking, basically you're a life saver, love you bro ❤😘
Далее
SSH Brute Force Protection With Fail2Ban
24:23
Просмотров 43 тыс.
Linux Crash Course - Understanding Logging
29:10
Просмотров 49 тыс.
НЮША УСПОКОИЛА КОТЯТ#cat
00:43
Просмотров 448 тыс.
tcpdump - Traffic Capture & Analysis
23:20
Просмотров 244 тыс.
How To Fully Anonymize Kali With Whonix
21:07
Просмотров 159 тыс.
Netstat Commands - Network Administration Tutorial
16:20
Cracking Enigma in 2021 - Computerphile
21:20
Просмотров 2,5 млн
How To Pivot Through a Network with Chisel
33:45
Просмотров 126 тыс.