Tuesday, December 11, 2018

● DELETE LOGS FROM DIFFERENT APPLICATIONS WEB MAIL ETC

● Delete logs from different applications web mail etc

Now lets take a look at some of the ways you can cover your footprints once you have entered a system (network, server, laptop, etc.)

Delete logs from different applications (web, mail, etc.)

Delete User Logs

Delete logs from different monitoring systems

Each system has different ways to monitor it for debugging or troubleshooting in the event of a problem

To do this, it is not necessary, like a hacker, to go step by step from file to file to look for and delete the latest logs. But it can use different existing scriptures (on the Internet) of other people with whom they can clean up their traces.

Here’s an example of a Windows program (also you can use the Event Viewer from any Windows machine) that does the job for you :)

On Linux you can use the following commands:

#rm ./bash_history - to delete the commands given by the current user

#vim /var/log/messages - a place where you can delete the logs that have been generated

Or in any other file in /var/log, depends on which application was attempting to exploit. There is another way we can delete the logs using Meterpreter (an application for PenTers.