How To Clear Tracks & Logs On Linux

  Рет қаралды 61,839

HackerSploit

HackerSploit

5 жыл бұрын

Hey guys! HackerSploit here back again with another video, in this video, I will be showing you how to clear your tracks and logs on Linux.
HACKERSPLOIT WEBSITE: hsploit.com/
⭐SUPPORT HACKERSPLOIT BY USING THE FOLLOWING LINKS:
NordVPN: nordvpn.org/hacker
Use the link above or the code below for 77% Off your order
Promo Code: hacker
Patreon: / hackersploit
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
🔗 HackerSploit Website: hsploit.com/
🔹 SUPPORT THE CHANNEL
NordVPN Affiliate Link: nordvpn.org/hacker
Patreon: / hackersploit
🔹 GET OUT COURSES
Get a special discount on our courses:
The Complete Deep Web Course 2018:
www.udemy.com/the-complete-de...
🔹 SOCIAL NETWORKS - Connect With Us!
-------------------------------
Facebook: / hackersploit
Twitter: / hackersploit
Instagram: / hackersploit
Patreon: / hackersploit
--------------------------------
Thanks for watching!
Благодаря за гледането
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
#Linux#ClearingTracks#Foresnics

Пікірлер: 111
@sWi5s
@sWi5s 5 жыл бұрын
Just a little tip for you : You can clear the console by pressing "CTRL+L", it's way faster than typing "clear"
@nawid1687
@nawid1687 3 жыл бұрын
Sorry I'm 2 years late but CTRL+L won't clear
@sWi5s
@sWi5s 3 жыл бұрын
@@nawid1687 what console are you using?
@nawid1687
@nawid1687 3 жыл бұрын
@@sWi5s Tmux, No I mean you feel like that it clears the screen but all the information is still up there
@sWi5s
@sWi5s 3 жыл бұрын
@@nawid1687 yep it doesn't work in tmux.
@sulochanakharat9033
@sulochanakharat9033 3 жыл бұрын
thanks
@hewfrebie2597
@hewfrebie2597 5 жыл бұрын
I know how to use history commands to clear it, but I want the whole video where I could find those logs in order to clear my trace, and you did a great job and exceeded our expectations!
@chowadagod
@chowadagod 5 жыл бұрын
Been pondering about this like forever .. 👌. U a life saver
@moneymac1114
@moneymac1114 3 ай бұрын
Great video with great easy to understand explanations !
@kabandajamir9844
@kabandajamir9844 2 жыл бұрын
The best explanation and illustrations ever you are the world's best teacher
@Retr0Kid
@Retr0Kid 5 жыл бұрын
Great video as always H.S, thanks again!
@slicy9318
@slicy9318 5 жыл бұрын
I love your videos dude keep doing this you're awesome!
@ymk24
@ymk24 5 жыл бұрын
the best thing i should have learned for hacking practice. thank you so much for this tutorial you are doing a great work.
@e1Pr0f3ss0r
@e1Pr0f3ss0r 5 жыл бұрын
Thank you very much for making this video... i learned lot of things from this... i hope & i wish that u will make sime informative on Cyber forensics in detail ... Waiting for it...
@siddharthtadury5612
@siddharthtadury5612 5 жыл бұрын
I Love each and every video you make. You are wiki to me,Thank a lot.!!
@nyser703
@nyser703 4 ай бұрын
Thank you Mr H.S for making this video
@florian2119
@florian2119 5 жыл бұрын
Thanks vety useful
@isectech
@isectech 5 жыл бұрын
We learned a lot, thanks
@wiredelectrosphere
@wiredelectrosphere 5 жыл бұрын
I wonder what if the company actually pipes logs to another server, then stores them in a very unusual place with an unusual name
@agents_of_hydra1859
@agents_of_hydra1859 3 жыл бұрын
Very useful and awesome video
@tecnolinux1469
@tecnolinux1469 5 жыл бұрын
Thanks for refreshing my mind with the commands on the video Do you have a video starting in ethical hacking?
@arshamrezaei4253
@arshamrezaei4253 3 жыл бұрын
you are the best Linux teacher
@kabandajamir9844
@kabandajamir9844 2 жыл бұрын
The world's best teacher thanks
@yigitaktas715
@yigitaktas715 3 жыл бұрын
great video ,thanks
@francescopresta9570
@francescopresta9570 5 жыл бұрын
Excellent!
@droidhackerr
@droidhackerr 2 жыл бұрын
Hey Mr HackerSploit, thanks 👍 Much love from share
@refaiabdeen5943
@refaiabdeen5943 Жыл бұрын
Cheers Mate.
@zawmin470
@zawmin470 5 жыл бұрын
This is actually important.
@rawkstar952
@rawkstar952 5 жыл бұрын
I appreciate the video sir alexis! :) how about tracks on the remote computer?
@AhmedMohamed-xs5ij
@AhmedMohamed-xs5ij 5 жыл бұрын
شرح اكثر من رائع :)
@JatinYadav1307
@JatinYadav1307 5 жыл бұрын
I was actually waiting for a tutorial on clearing logs as nothing good was available online.
@chandrahasan9845
@chandrahasan9845 5 жыл бұрын
thank you
@mentalimage4140
@mentalimage4140 5 жыл бұрын
Please do make the windows and macOS version next, it would be nice while the knowledge is fresh :-)
@melvinjaltsater
@melvinjaltsater 5 жыл бұрын
Do the windows one, it's going to be fun to learn
@iakashx
@iakashx 5 жыл бұрын
Oh man..!! That's alot. ✊✊Thank you.!
@agents_of_hydra1859
@agents_of_hydra1859 3 жыл бұрын
Hackersploit is best english hacking channel 😎
@qani613
@qani613 2 жыл бұрын
Can you make a video on how submit report after pent testing?
@cyber222
@cyber222 5 жыл бұрын
Great
@ronakrawal8325
@ronakrawal8325 5 жыл бұрын
Sir Make Series On Forensic Investigation.
@peesicle
@peesicle 3 жыл бұрын
sir can you please tell me why everyone here with a foreign name says sir?
@MrGFYne1337357
@MrGFYne1337357 5 жыл бұрын
#NOTIFICATIONSQUAD
@zawmin470
@zawmin470 5 жыл бұрын
Just wow
@donesitackacom
@donesitackacom 5 жыл бұрын
Command history is appended to the file whose path is stored in the variable "$HISTFILE", but only AFTER you have ended your session. HISTFILE is automatically set to ~/.bash_history for each new shell. TL;DR Just type HISTFILE=/dev/null when you're hacking and nothing will be saved in .bash_history
@samtheharvester6188
@samtheharvester6188 3 жыл бұрын
clever
@ihateyoutubehandles
@ihateyoutubehandles 5 жыл бұрын
Great vid but my eyes went straight to one of your tags "Foresnics" :P
@IT-py9tu
@IT-py9tu 4 жыл бұрын
what about journal logs? pretty important
5 жыл бұрын
Nice tutorial! Is it also valid for SSD?
@ivan6navi
@ivan6navi 5 жыл бұрын
Yes.
@alexanderparvanov815
@alexanderparvanov815 5 жыл бұрын
What happened with the evil twin second video?
@Torterra_ghahhyhiHd
@Torterra_ghahhyhiHd Жыл бұрын
the program shred the files, should have a amnesic part that forget how it had over write the file. kind of using rust or nim and no c or c++ that use other part of memory to do a new task.
@yashwanth_guduru
@yashwanth_guduru 5 жыл бұрын
I know this is easy to over look but shred relies on an important assumption. That is, A file system overwrites the data in place which isn't the case in all of the present day file systems(Xfs , ext3 or raid-based file systems in some case's) Just a heads up for someone who is going to try this.
@sohailsaha7427
@sohailsaha7427 3 жыл бұрын
Can you explain please? Also, what would be a better alternative?
@pidkarpe
@pidkarpe 5 жыл бұрын
PAX invictus , namaste !
@christinadeswood3999
@christinadeswood3999 2 жыл бұрын
ALL INTEGRATED CIRCUTS SHOW TRACKS AND IS DOWNLOADABLE FOR USE IN ANY DIRECTION AND THEN IT'S ANALYZED FOR BEHAVIOR COOL RIGHT
@hewfrebie2597
@hewfrebie2597 5 жыл бұрын
When are you going to explain about why you use Linux since you've said before beginning a netstat tutorial commands.
@darrylmusashi6352
@darrylmusashi6352 5 жыл бұрын
Is there a way to prevent these logs from being stored in the first place?
@pythontutor9069
@pythontutor9069 4 жыл бұрын
In Arch Linux, the directory /var/log/journal/ is a part of the systemd package, and the journal (when Storage= is set to auto in /etc/systemd/journald.conf) will write to /var/log/journal/. If that directory is deleted, systemd will not recreate it automatically and instead will write its logs to /run/systemd/journal in a nonpersistent way. However, the folder will be recreated if Storage=persistent is added to journald.conf and systemd-journald.service (the logging service) is restarted (or the system is rebooted). (Directly from archlinux wiki) and on other systems which logging is a service stackoverflow.com/questions/17358499/linux-how-to-disable-all-log read this. But I don't know how reliable is this method.
@peterbertalan1684
@peterbertalan1684 3 жыл бұрын
Shredding important log files is not preventing the system to work as intended ?! Lets suppose i am pentesting a Linux Machine ,Is it not easier to backup all the log files at the exact moment when i log into the machine ,And after my changes in the FIlesystem ,I simply replaced the modified log files with the original one ? ( Ofc deleting the later generated entrys from the log files like auth.log and .bash_history , etc )
@samtheharvester6188
@samtheharvester6188 3 жыл бұрын
This is actually a clever idea
@rrmusic970
@rrmusic970 5 жыл бұрын
so i have to shred all the file that have a .log in my linux to make it clean?
@aakashchandrakar6359
@aakashchandrakar6359 5 жыл бұрын
make video SS7
@llellouche
@llellouche 5 жыл бұрын
Clearing logs 99% of times is not allowed in a pentest since if there is a real attacker his defense can argue that logs are admissible since the company pentester or third party pentester tempered with logs also the use of rootkits and code injection in product source code since it has major impact so pentestos always limited somehow and before you go clear logs be 100% you have permission written permission since it's not a joke
@bisaum12
@bisaum12 4 жыл бұрын
Next time, use commas.
@bisaum12
@bisaum12 4 жыл бұрын
Not using commas creates an unnecessary mental overhead for people trying to understand you.
@zyan983
@zyan983 4 жыл бұрын
This is for both pentesters and people who just want to mess around with cybersecurity.
@llellouche
@llellouche 4 жыл бұрын
I apologise for not using commas, you are absolutely right.
@joaorachao4602
@joaorachao4602 3 жыл бұрын
How to clear ufw.log file, kern.log and syslog.
@jagsirsingh2179
@jagsirsingh2179 5 жыл бұрын
1.hey Hackersploit can you tell me something about this LAN tap all ATM machines are working on LAN is this possible to sniff ATM transaction 2. is that possible Hackers can intercept ATM machine that i am using for my transaction ???
@8080VB
@8080VB 3 жыл бұрын
If your on live os , this aint needed , anyway good informative vid !💯
@alimujtaba9063
@alimujtaba9063 3 жыл бұрын
Starts from 4:44
@GodotEnjoyer
@GodotEnjoyer Жыл бұрын
Since there is no Windows video yet, does anyone knows an alternative for windows machines?
@anupamjaiswal7714
@anupamjaiswal7714 4 жыл бұрын
Does overwriting the file with null can't be recovered????
@vigneshwarsj6236
@vigneshwarsj6236 5 жыл бұрын
How can I done it in Android termux
@deepakgulia3863
@deepakgulia3863 8 ай бұрын
After giving the command " shred - vfzu auth.log". It shows "Shred : auth log failed to open for writing: operation not permitted " Kindly give the solution
@salokyakumar
@salokyakumar 4 жыл бұрын
For Windows also..
@sohaibmhariri6810
@sohaibmhariri6810 5 жыл бұрын
Plz help me , i have a problem , when i use python for cupp.py , error and say : File cupp.py, line 40, in import urllib.error import error : no module named error , help me plz
@chodetode7419
@chodetode7419 5 жыл бұрын
If you're using Python3 make sure you have pip installed and try running "pip3 install urllib3". Then try and run cuppy.py again.
@Torterra_ghahhyhiHd
@Torterra_ghahhyhiHd Жыл бұрын
but why not just put all to 1 or 0 . all. the file size.
@detective5253
@detective5253 3 жыл бұрын
okay i agree about clearing logs and backdoors! but how if the forensics team recover all the deleted data over the device! its just an old trick now the nsa have a big technology helping them to finding the hackers like over communication gsm-line but if you hack the server and exploit the root privileges to editing the virtual ip it will be fine!
@majestinostario1341
@majestinostario1341 2 жыл бұрын
Gracias!
@sakshamsharma8395
@sakshamsharma8395 5 жыл бұрын
How can I replace windows 10 with kali linux 2018.4 permanently help me plzz upload video
@peesicle
@peesicle 3 жыл бұрын
if you don't know how to do that don't even get Kali
@AbdulKalam-kq3fl
@AbdulKalam-kq3fl 3 жыл бұрын
macos getting popular among pentesters? could someone explain this
@peesicle
@peesicle 3 жыл бұрын
Mac os? where?
@jagannathpanigrahi2828
@jagannathpanigrahi2828 5 жыл бұрын
Hey Alexis , Please make videos with white terminal..Finding it difficult to watch.
@jiangyi19850130
@jiangyi19850130 3 жыл бұрын
why is the file renamed to 000000 then 00000 then 0000 then...
@droidhackerr
@droidhackerr 2 жыл бұрын
It is creating multiple overwriting with random 1s and 0s in other to get rid of the file. More of writing 20 words on a tiny piece of paper to overwrite the previous.
@jiangyi19850130
@jiangyi19850130 2 жыл бұрын
At that point I guess the content of the file (data block) is already overwritten. It's just overwriting the name of the file in disk index block.
@droidhackerr
@droidhackerr 2 жыл бұрын
@@jiangyi19850130 probably, but am also not sure about that
@waiwai4480
@waiwai4480 5 жыл бұрын
is every site vulnerable for sql injection or not ??
@sdadi9170
@sdadi9170 5 жыл бұрын
No
@waiwai4480
@waiwai4480 5 жыл бұрын
Sufian Dadiani how can you be sure ?
@sdadi9170
@sdadi9170 5 жыл бұрын
Because i pentest and ive tried before
@waiwai4480
@waiwai4480 5 жыл бұрын
Sufian Dadiani are you a pentester ?
@waiwai4480
@waiwai4480 5 жыл бұрын
plushoom what attacks are used by hacker nowadays for accesing database ? can you list them ?
@SaurabhSharma-ip9kw
@SaurabhSharma-ip9kw 5 жыл бұрын
How to do on windows 10 ??
@chodetode7419
@chodetode7419 5 жыл бұрын
Some of the stuff seen in these videos can be done on Windows, but you'd probably have better luck in a Linux environment. I'd recommend installing Linux in a Virtual Machine if you're able to. It won't cost you any money, and you won't need to get rid of Windows ether. You'll have a way better time following along with these videos if you do.
@MedD0c
@MedD0c 5 жыл бұрын
Windows is calling home in real time once having network. Not possible
@punyasiapa1952
@punyasiapa1952 5 жыл бұрын
#02Presiden_RI1 #INAelectionObserverSOS #IndonesiaCallsCarterCenter #INAelectionObserverSOS90TURKI #CYBERMUSLIMRUSSIANFORPRABOWOSOS​
@welcometohe1l
@welcometohe1l 2 жыл бұрын
Очень много говорит и очень мало делает
@mrsmith4534
@mrsmith4534 5 жыл бұрын
YOU SHOULD REALLY PLAY PUBG
@zyan983
@zyan983 4 жыл бұрын
No just no.
@muhammadasymawi6359
@muhammadasymawi6359 3 жыл бұрын
5 minute only speak hmm
@rukoray3920
@rukoray3920 5 жыл бұрын
#NOTIFICATIONSQUAD
@rukoray3920
@rukoray3920 5 жыл бұрын
In India it takes 30,000 rupees to learn ethical hacking, basically you're a life saver, love you bro ❤😘
SSH Brute Force Protection With Fail2Ban
24:23
HackerSploit
Рет қаралды 42 М.
Unicornscan - Port Scanning
19:00
HackerSploit
Рет қаралды 30 М.
⬅️🤔➡️
00:31
Celine Dept
Рет қаралды 52 МЛН
Каха ограбил банк
01:00
К-Media
Рет қаралды 10 МЛН
Did you believe it was real? #tiktok
00:25
Анастасия Тарасова
Рет қаралды 15 МЛН
World’s Deadliest Obstacle Course!
28:25
MrBeast
Рет қаралды 149 МЛН
Netstat Commands - Network Administration Tutorial
16:20
HackerSploit
Рет қаралды 136 М.
HELP!! (for when you suck at Linux) // Linux for Hackers // EP3
13:14
Filtering .log files, with cat, grep, cut, sort, and uniq
15:36
how hackers hack any websites in minutes?!
23:17
Loi Liang Yang
Рет қаралды 221 М.
Maltego - Automated Information Gathering
25:02
HackerSploit
Рет қаралды 211 М.
Linux File System/Structure Explained!
15:59
DorianDotSlash
Рет қаралды 4 МЛН
Learning Awk Is Essential For Linux Users
20:02
DistroTube
Рет қаралды 287 М.
NIX OS: the BEST package manager on the MOST SOLID Linux distribution
17:08
The Linux Experiment
Рет қаралды 304 М.
GamePad İle Bisiklet Yönetmek #shorts
0:26
Osman Kabadayı
Рет қаралды 107 М.
1$ vs 500$ ВИРТУАЛЬНАЯ РЕАЛЬНОСТЬ !
23:20
GoldenBurst
Рет қаралды 1,4 МЛН
В России ускорили интернет в 1000 раз
0:18
Короче, новости
Рет қаралды 997 М.