How To Clear Tracks & Logs On Linux

แชร์
ฝัง
  • เผยแพร่เมื่อ 15 ต.ค. 2024
  • Hey guys! HackerSploit here back again with another video, in this video, I will be showing you how to clear your tracks and logs on Linux.
    HACKERSPLOIT WEBSITE: hsploit.com/
    ⭐SUPPORT HACKERSPLOIT BY USING THE FOLLOWING LINKS:
    NordVPN: nordvpn.org/ha...
    Use the link above or the code below for 77% Off your order
    Promo Code: hacker
    Patreon: / hackersploit
    I Hope you enjoy/enjoyed the video.
    If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
    🔗 HackerSploit Website: hsploit.com/
    🔹 SUPPORT THE CHANNEL
    NordVPN Affiliate Link: nordvpn.org/ha...
    Patreon: / hackersploit
    🔹 GET OUT COURSES
    Get a special discount on our courses:
    The Complete Deep Web Course 2018:
    www.udemy.com/...
    🔹 SOCIAL NETWORKS - Connect With Us!
    -------------------------------
    Facebook: / hackersploit
    Twitter: / hackersploit
    Instagram: / hackersploit
    Patreon: / hackersploit
    --------------------------------
    Thanks for watching!
    Благодаря за гледането
    Kiitos katsomisesta
    Danke fürs Zuschauen!
    感谢您观看
    Merci d'avoir regardé
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद
    #Linux#ClearingTracks#Foresnics

ความคิดเห็น • 112

  • @sWi5s
    @sWi5s 5 ปีที่แล้ว +20

    Just a little tip for you : You can clear the console by pressing "CTRL+L", it's way faster than typing "clear"

    • @nawid1687
      @nawid1687 3 ปีที่แล้ว +2

      Sorry I'm 2 years late but CTRL+L won't clear

    • @sWi5s
      @sWi5s 3 ปีที่แล้ว

      @@nawid1687 what console are you using?

    • @nawid1687
      @nawid1687 3 ปีที่แล้ว +1

      @@sWi5s Tmux, No I mean you feel like that it clears the screen but all the information is still up there

    • @sWi5s
      @sWi5s 3 ปีที่แล้ว +1

      @@nawid1687 yep it doesn't work in tmux.

    • @sulochanakharat9033
      @sulochanakharat9033 3 ปีที่แล้ว

      thanks

  • @kabandajamir9844
    @kabandajamir9844 2 ปีที่แล้ว +2

    The best explanation and illustrations ever you are the world's best teacher

  • @hewfrebie2597
    @hewfrebie2597 5 ปีที่แล้ว +3

    I know how to use history commands to clear it, but I want the whole video where I could find those logs in order to clear my trace, and you did a great job and exceeded our expectations!

  • @wiredelectrosphere
    @wiredelectrosphere 5 ปีที่แล้ว +11

    I wonder what if the company actually pipes logs to another server, then stores them in a very unusual place with an unusual name

  • @chowadagod
    @chowadagod 5 ปีที่แล้ว +4

    Been pondering about this like forever .. 👌. U a life saver

  • @kabandajamir9844
    @kabandajamir9844 2 ปีที่แล้ว +1

    The world's best teacher thanks

  • @moneymac1114
    @moneymac1114 7 หลายเดือนก่อน

    Great video with great easy to understand explanations !

  • @nyser703
    @nyser703 8 หลายเดือนก่อน

    Thank you Mr H.S for making this video

  • @arshamrezaei4253
    @arshamrezaei4253 3 ปีที่แล้ว +1

    you are the best Linux teacher

  • @JatinYadav1307
    @JatinYadav1307 5 ปีที่แล้ว +1

    I was actually waiting for a tutorial on clearing logs as nothing good was available online.

  • @droidhackerr
    @droidhackerr 2 ปีที่แล้ว +1

    Hey Mr HackerSploit, thanks 👍
    Much love from share

  • @ronakrawal8325
    @ronakrawal8325 5 ปีที่แล้ว +7

    Sir Make Series On Forensic Investigation.

    • @peesicle
      @peesicle 3 ปีที่แล้ว

      sir can you please tell me why everyone here with a foreign name says sir?

  • @e1Pr0f3ss0r
    @e1Pr0f3ss0r 5 ปีที่แล้ว +1

    Thank you very much for making this video... i learned lot of things from this...
    i hope & i wish that u will make sime informative on Cyber forensics in detail ...
    Waiting for it...

  • @ymk24
    @ymk24 5 ปีที่แล้ว

    the best thing i should have learned for hacking practice. thank you so much for this tutorial you are doing a great work.

  • @jagsirsingh2179
    @jagsirsingh2179 5 ปีที่แล้ว +1

    1.hey Hackersploit can you tell me something about this LAN tap all ATM machines are working on LAN is this possible to sniff ATM transaction
    2. is that possible Hackers can intercept ATM machine that i am using for my transaction ???

  • @peterbertalan1684
    @peterbertalan1684 3 ปีที่แล้ว +2

    Shredding important log files is not preventing the system to work as intended ?! Lets suppose i am pentesting a Linux Machine ,Is it not easier to backup all the log files at the exact moment when i log into the machine ,And after my changes in the FIlesystem ,I simply replaced the modified log files with the original one ? ( Ofc deleting the later generated entrys from the log files like auth.log and .bash_history , etc )

  • @tecnolinux1469
    @tecnolinux1469 5 ปีที่แล้ว +1

    Thanks for refreshing my mind with the commands on the video Do you have a video starting in ethical hacking?

  • @melvinjaltsater
    @melvinjaltsater 5 ปีที่แล้ว +1

    Do the windows one, it's going to be fun to learn

  •  5 ปีที่แล้ว +1

    Nice tutorial! Is it also valid for SSD?

  • @rawkstar952
    @rawkstar952 5 ปีที่แล้ว +2

    I appreciate the video sir alexis! :) how about tracks on the remote computer?

  • @agents_of_hydra1859
    @agents_of_hydra1859 3 ปีที่แล้ว

    Hackersploit is best english hacking channel 😎

  • @siddharthtadury5612
    @siddharthtadury5612 5 ปีที่แล้ว +1

    I Love each and every video you make. You are wiki to me,Thank a lot.!!

  • @qani613
    @qani613 3 ปีที่แล้ว

    Can you make a video on how submit report after pent testing?

  • @deepakgulia3863
    @deepakgulia3863 11 หลายเดือนก่อน

    After giving the command " shred - vfzu auth.log". It shows "Shred : auth log failed to open for writing: operation not permitted "
    Kindly give the solution

  • @slicy9318
    @slicy9318 5 ปีที่แล้ว

    I love your videos dude keep doing this you're awesome!

  • @darrylmusashi6352
    @darrylmusashi6352 5 ปีที่แล้ว +5

    Is there a way to prevent these logs from being stored in the first place?

    • @pythontutor9069
      @pythontutor9069 4 ปีที่แล้ว +1

      In Arch Linux, the directory /var/log/journal/ is a part of the systemd package, and the journal (when Storage= is set to auto in /etc/systemd/journald.conf) will write to /var/log/journal/. If that directory is deleted, systemd will not recreate it automatically and instead will write its logs to /run/systemd/journal in a nonpersistent way. However, the folder will be recreated if Storage=persistent is added to journald.conf and systemd-journald.service (the logging service) is restarted (or the system is rebooted). (Directly from archlinux wiki) and on other systems which logging is a service stackoverflow.com/questions/17358499/linux-how-to-disable-all-log read this. But I don't know how reliable is this method.

  • @donesitackacom
    @donesitackacom 5 ปีที่แล้ว +9

    Command history is appended to the file whose path is stored in the variable "$HISTFILE", but only AFTER you have ended your session. HISTFILE is automatically set to ~/.bash_history for each new shell.
    TL;DR
    Just type HISTFILE=/dev/null when you're hacking and nothing will be saved in .bash_history

  • @yashwanth_guduru
    @yashwanth_guduru 5 ปีที่แล้ว +1

    I know this is easy to over look but shred relies on an important assumption. That is, A file system overwrites the data in place which isn't the case in all of the present day file systems(Xfs , ext3 or raid-based file systems in some case's)
    Just a heads up for someone who is going to try this.

    • @sohailsaha7427
      @sohailsaha7427 4 ปีที่แล้ว

      Can you explain please? Also, what would be a better alternative?

  • @agents_of_hydra1859
    @agents_of_hydra1859 3 ปีที่แล้ว

    Very useful and awesome video

  • @mentalimage4140
    @mentalimage4140 5 ปีที่แล้ว

    Please do make the windows and macOS version next, it would be nice while the knowledge is fresh :-)

  • @Retr0Kid
    @Retr0Kid 5 ปีที่แล้ว

    Great video as always H.S, thanks again!

  • @AhmedMohamed-xs5ij
    @AhmedMohamed-xs5ij 5 ปีที่แล้ว +3

    شرح اكثر من رائع :)

  • @refaiabdeen5943
    @refaiabdeen5943 ปีที่แล้ว

    Cheers Mate.

  • @zawmin470
    @zawmin470 5 ปีที่แล้ว

    This is actually important.

  • @yigitaktas715
    @yigitaktas715 3 ปีที่แล้ว

    great video ,thanks

  • @llellouche
    @llellouche 5 ปีที่แล้ว +6

    Clearing logs 99% of times is not allowed in a pentest since if there is a real attacker his defense can argue that logs are admissible since the company pentester or third party pentester tempered with logs also the use of rootkits and code injection in product source code since it has major impact so pentestos always limited somehow and before you go clear logs be 100% you have permission written permission since it's not a joke

    • @bisaum12
      @bisaum12 4 ปีที่แล้ว +3

      Next time, use commas.

    • @bisaum12
      @bisaum12 4 ปีที่แล้ว +1

      Not using commas creates an unnecessary mental overhead for people trying to understand you.

    • @zyan983
      @zyan983 4 ปีที่แล้ว

      This is for both pentesters and people who just want to mess around with cybersecurity.

    • @llellouche
      @llellouche 4 ปีที่แล้ว +2

      I apologise for not using commas, you are absolutely right.

  • @Torterra_ghahhyhiHd
    @Torterra_ghahhyhiHd ปีที่แล้ว

    the program shred the files, should have a amnesic part that forget how it had over write the file. kind of using rust or nim and no c or c++ that use other part of memory to do a new task.

  • @christinadeswood3999
    @christinadeswood3999 2 ปีที่แล้ว

    ALL INTEGRATED CIRCUTS SHOW TRACKS AND IS DOWNLOADABLE FOR USE IN ANY DIRECTION AND THEN IT'S ANALYZED FOR BEHAVIOR COOL RIGHT

  • @isectech
    @isectech 5 ปีที่แล้ว

    We learned a lot, thanks

  • @anupamjaiswal7714
    @anupamjaiswal7714 4 ปีที่แล้ว

    Does overwriting the file with null can't be recovered????

  • @wolfpoker
    @wolfpoker 5 ปีที่แล้ว +1

    Great vid but my eyes went straight to one of your tags "Foresnics" :P

  • @GodotEnjoyer
    @GodotEnjoyer 2 ปีที่แล้ว

    Since there is no Windows video yet, does anyone knows an alternative for windows machines?

  • @joaorachao4602
    @joaorachao4602 3 ปีที่แล้ว +1

    How to clear ufw.log file, kern.log and syslog.

  • @hewfrebie2597
    @hewfrebie2597 5 ปีที่แล้ว

    When are you going to explain about why you use Linux since you've said before beginning a netstat tutorial commands.

  • @rrmusic970
    @rrmusic970 5 ปีที่แล้ว

    so i have to shred all the file that have a .log in my linux to make it clean?

  • @florian2119
    @florian2119 5 ปีที่แล้ว +1

    Thanks vety useful

  • @alexanderparvanov815
    @alexanderparvanov815 5 ปีที่แล้ว +4

    What happened with the evil twin second video?

  • @8080VB
    @8080VB 3 ปีที่แล้ว

    If your on live os , this aint needed , anyway good informative vid !💯

  • @alimujtaba9063
    @alimujtaba9063 3 ปีที่แล้ว +1

    Starts from 4:44

  • @IT-py9tu
    @IT-py9tu 4 ปีที่แล้ว

    what about journal logs? pretty important

  • @francescopresta9570
    @francescopresta9570 5 ปีที่แล้ว

    Excellent!

  • @sohaibmhariri6810
    @sohaibmhariri6810 5 ปีที่แล้ว

    Plz help me , i have a problem , when i use python for cupp.py , error and say : File cupp.py, line 40, in
    import urllib.error
    import error : no module named error
    , help me plz

    • @chodetode7419
      @chodetode7419 5 ปีที่แล้ว +1

      If you're using Python3 make sure you have pip installed and try running "pip3 install urllib3". Then try and run cuppy.py again.

  • @chandrahasan9845
    @chandrahasan9845 5 ปีที่แล้ว

    thank you

  • @iakashx
    @iakashx 5 ปีที่แล้ว +2

    Oh man..!! That's alot. ✊✊Thank you.!

  • @Torterra_ghahhyhiHd
    @Torterra_ghahhyhiHd ปีที่แล้ว

    but why not just put all to 1 or 0 . all. the file size.

  • @aakashchandrakar6359
    @aakashchandrakar6359 5 ปีที่แล้ว +2

    make video SS7

  • @detective5253
    @detective5253 4 ปีที่แล้ว

    okay i agree about clearing logs and backdoors! but how if the forensics team recover all the deleted data over the device! its just an old trick now the nsa have a big technology helping them to finding the hackers like over communication gsm-line but if you hack the server and exploit the root privileges to editing the virtual ip it will be fine!

  • @vigneshwarsj6236
    @vigneshwarsj6236 5 ปีที่แล้ว

    How can I done it in Android termux

  • @pidkarpe
    @pidkarpe 5 ปีที่แล้ว

    PAX invictus , namaste !

  • @sakshamsharma8395
    @sakshamsharma8395 5 ปีที่แล้ว

    How can I replace windows 10 with kali linux 2018.4 permanently help me plzz upload video

    • @peesicle
      @peesicle 3 ปีที่แล้ว +1

      if you don't know how to do that don't even get Kali

  • @jiangyi19850130
    @jiangyi19850130 4 ปีที่แล้ว

    why is the file renamed to 000000 then 00000 then 0000 then...

    • @droidhackerr
      @droidhackerr 2 ปีที่แล้ว

      It is creating multiple overwriting with random 1s and 0s in other to get rid of the file.
      More of writing 20 words on a tiny piece of paper to overwrite the previous.

    • @jiangyi19850130
      @jiangyi19850130 2 ปีที่แล้ว +1

      At that point I guess the content of the file (data block) is already overwritten. It's just overwriting the name of the file in disk index block.

    • @droidhackerr
      @droidhackerr 2 ปีที่แล้ว

      @@jiangyi19850130 probably, but am also not sure about that

  • @cyber222
    @cyber222 5 ปีที่แล้ว

    Great

  • @AbdulKalam-kq3fl
    @AbdulKalam-kq3fl 4 ปีที่แล้ว

    macos getting popular among pentesters?
    could someone explain this

    • @peesicle
      @peesicle 3 ปีที่แล้ว

      Mac os? where?

  • @zawmin470
    @zawmin470 5 ปีที่แล้ว

    Just wow

  • @waiwai4480
    @waiwai4480 5 ปีที่แล้ว +1

    is every site vulnerable for sql injection or not ??

    • @sdadi9170
      @sdadi9170 5 ปีที่แล้ว +1

      No

    • @waiwai4480
      @waiwai4480 5 ปีที่แล้ว

      Sufian Dadiani how can you be sure ?

    • @sdadi9170
      @sdadi9170 5 ปีที่แล้ว

      Because i pentest and ive tried before

    • @waiwai4480
      @waiwai4480 5 ปีที่แล้ว

      Sufian Dadiani are you a pentester ?

    • @waiwai4480
      @waiwai4480 5 ปีที่แล้ว

      plushoom what attacks are used by hacker nowadays for accesing database ? can you list them ?

  • @jagannathpanigrahi2828
    @jagannathpanigrahi2828 5 ปีที่แล้ว

    Hey Alexis , Please make videos with white terminal..Finding it difficult to watch.

  • @salokyakumar
    @salokyakumar 4 ปีที่แล้ว

    For Windows also..

  • @MrGFYne1337357
    @MrGFYne1337357 5 ปีที่แล้ว +1

    #NOTIFICATIONSQUAD

  • @yyaaooww
    @yyaaooww 2 ปีที่แล้ว +1

    Очень много говорит и очень мало делает

  • @SaurabhSharma-ip9kw
    @SaurabhSharma-ip9kw 5 ปีที่แล้ว +1

    How to do on windows 10 ??

    • @chodetode7419
      @chodetode7419 5 ปีที่แล้ว +2

      Some of the stuff seen in these videos can be done on Windows, but you'd probably have better luck in a Linux environment. I'd recommend installing Linux in a Virtual Machine if you're able to. It won't cost you any money, and you won't need to get rid of Windows ether. You'll have a way better time following along with these videos if you do.

    • @MedD0c
      @MedD0c 5 ปีที่แล้ว +1

      Windows is calling home in real time once having network. Not possible

  • @punyasiapa1952
    @punyasiapa1952 5 ปีที่แล้ว

    #02Presiden_RI1
    #INAelectionObserverSOS
    #IndonesiaCallsCarterCenter
    #INAelectionObserverSOS90TURKI
    #CYBERMUSLIMRUSSIANFORPRABOWOSOS​

  • @muhammadasymawi6359
    @muhammadasymawi6359 3 ปีที่แล้ว

    5 minute only speak hmm

  • @mrsmith4534
    @mrsmith4534 5 ปีที่แล้ว +1

    YOU SHOULD REALLY PLAY PUBG

    • @zyan983
      @zyan983 4 ปีที่แล้ว

      No just no.

  • @rukoray3920
    @rukoray3920 5 ปีที่แล้ว +5

    #NOTIFICATIONSQUAD

    • @rukoray3920
      @rukoray3920 5 ปีที่แล้ว

      In India it takes 30,000 rupees to learn ethical hacking, basically you're a life saver, love you bro ❤😘