As you read this post's title you might think that it has evil purposes. Well, it may have or not, it depends on what you'll do with the content. It's up to your responsibility. I provide this information just for educational purposes.
This is a short tutorial about the methods used by hackers (please cut the bullshit, I'll use the term hacker for either the good or bad ones) to erase tracks on a compromised machine.
On this first part of the tutorial I'll only show a common type of tool used to complete the above task quickly. It's a simple log eraser written in perl and with it you may see the folders to check in Linux machines for logs. Tomorrow, on part II I'll explain folder by folder and log by log on Linux and Windows machines.
This is a short tutorial about the methods used by hackers (please cut the bullshit, I'll use the term hacker for either the good or bad ones) to erase tracks on a compromised machine.
On this first part of the tutorial I'll only show a common type of tool used to complete the above task quickly. It's a simple log eraser written in perl and with it you may see the folders to check in Linux machines for logs. Tomorrow, on part II I'll explain folder by folder and log by log on Linux and Windows machines.
---> logeraser.pl <---
6 comments:
Why perl ? All you do in that script is run a bunch of system commands.
Why not write it in bash or sh ? That way it will be more portable and will work on systems without perl.
@Dave
A linux/unix system without Perl? Yeah, right... that'll never happen
yes... unix system without perl is ultra rare.... so I think the language is not a problem.
People should read this.
well ether way it is usefull
111111
Post a Comment