● Delete logs from different applications web mail etc
Now lets take a look at some of the ways you can cover your footprints once you have entered a system (network, server, laptop, etc.)
● Delete logs from different applications (web, mail, etc.)
● Delete User Logs
● Delete logs from different monitoring systems
Each system has different ways to monitor it for debugging or troubleshooting in the event of a problem
To do this, it is not necessary, like a hacker, to go step by step from file to file to look for and delete the latest logs. But it can use different existing scriptures (on the Internet) of other people with whom they can clean up their traces.
Here’s an example of a Windows program (also you can use the Event Viewer from any Windows machine) that does the job for you :)
On Linux you can use the following commands:
#rm ./bash_history - to delete the commands given by the current user
#vim /var/log/messages - a place where you can delete the logs that have been generated
Or in any other file in /var/log, depends on which application was attempting to exploit. There is another way we can delete the logs using Meterpreter (an application for PenTers.