July 28, 2021

SpywareNews.com

Dedicated Forum to help removing adware, malware, spyware, ransomware, trojans, viruses and more!

Clear the Logs & Bash History on Hacked Linux Systems to Cover Your Tracks & Remain Undetected

Clear the Logs & Bash History on Hacked Linux Systems to Cover Your Tracks & Remain Undetected

As a hacker, the final stage of exploitation is covering their tracks, which involves wiping all activity and logs so that they can avoid being detected. It’s especially crucial for persistence if the target will be accessed again in the future by the attacker.

To show you the basics of covering your tracks, we’ll compromise a target first, then explore some techniques used to delete Bash history, clear logs, and remain hidden after exploiting a Linux system. You can check out our Cyber Weapons Lab video below that outlines my guide or skip below to get right to the written steps.

Video:… more