I know how to use history commands to clear it, but I want the whole video where I could find those logs in order to clear my trace, and you did a great job and exceeded our expectations!
Thank you very much for making this video... i learned lot of things from this... i hope & i wish that u will make sime informative on Cyber forensics in detail ... Waiting for it...
Shredding important log files is not preventing the system to work as intended ?! Lets suppose i am pentesting a Linux Machine ,Is it not easier to backup all the log files at the exact moment when i log into the machine ,And after my changes in the FIlesystem ,I simply replaced the modified log files with the original one ? ( Ofc deleting the later generated entrys from the log files like auth.log and .bash_history , etc )
Command history is appended to the file whose path is stored in the variable "$HISTFILE", but only AFTER you have ended your session. HISTFILE is automatically set to ~/.bash_history for each new shell. TL;DR Just type HISTFILE=/dev/null when you're hacking and nothing will be saved in .bash_history
Clearing logs 99% of times is not allowed in a pentest since if there is a real attacker his defense can argue that logs are admissible since the company pentester or third party pentester tempered with logs also the use of rootkits and code injection in product source code since it has major impact so pentestos always limited somehow and before you go clear logs be 100% you have permission written permission since it's not a joke
I know this is easy to over look but shred relies on an important assumption. That is, A file system overwrites the data in place which isn't the case in all of the present day file systems(Xfs , ext3 or raid-based file systems in some case's) Just a heads up for someone who is going to try this.
In Arch Linux, the directory /var/log/journal/ is a part of the systemd package, and the journal (when Storage= is set to auto in /etc/systemd/journald.conf) will write to /var/log/journal/. If that directory is deleted, systemd will not recreate it automatically and instead will write its logs to /run/systemd/journal in a nonpersistent way. However, the folder will be recreated if Storage=persistent is added to journald.conf and systemd-journald.service (the logging service) is restarted (or the system is rebooted). (Directly from archlinux wiki) and on other systems which logging is a service stackoverflow.com/questions/17358499/linux-how-to-disable-all-log read this. But I don't know how reliable is this method.
the program shred the files, should have a amnesic part that forget how it had over write the file. kind of using rust or nim and no c or c++ that use other part of memory to do a new task.
After giving the command " shred - vfzu auth.log". It shows "Shred : auth log failed to open for writing: operation not permitted " Kindly give the solution
Plz help me , i have a problem , when i use python for cupp.py , error and say : File cupp.py, line 40, in import urllib.error import error : no module named error , help me plz
okay i agree about clearing logs and backdoors! but how if the forensics team recover all the deleted data over the device! its just an old trick now the nsa have a big technology helping them to finding the hackers like over communication gsm-line but if you hack the server and exploit the root privileges to editing the virtual ip it will be fine!
1.hey Hackersploit can you tell me something about this LAN tap all ATM machines are working on LAN is this possible to sniff ATM transaction 2. is that possible Hackers can intercept ATM machine that i am using for my transaction ???
It is creating multiple overwriting with random 1s and 0s in other to get rid of the file. More of writing 20 words on a tiny piece of paper to overwrite the previous.
Some of the stuff seen in these videos can be done on Windows, but you'd probably have better luck in a Linux environment. I'd recommend installing Linux in a Virtual Machine if you're able to. It won't cost you any money, and you won't need to get rid of Windows ether. You'll have a way better time following along with these videos if you do.
Just a little tip for you : You can clear the console by pressing "CTRL+L", it's way faster than typing "clear"
Sorry I'm 2 years late but CTRL+L won't clear
@@nawid1687 what console are you using?
@@sWi5s Tmux, No I mean you feel like that it clears the screen but all the information is still up there
@@nawid1687 yep it doesn't work in tmux.
thanks
I know how to use history commands to clear it, but I want the whole video where I could find those logs in order to clear my trace, and you did a great job and exceeded our expectations!
The best explanation and illustrations ever you are the world's best teacher
Been pondering about this like forever .. 👌. U a life saver
you are the best Linux teacher
The world's best teacher thanks
I wonder what if the company actually pipes logs to another server, then stores them in a very unusual place with an unusual name
Thank you Mr H.S for making this video
Great video with great easy to understand explanations !
Thank you very much for making this video... i learned lot of things from this...
i hope & i wish that u will make sime informative on Cyber forensics in detail ...
Waiting for it...
I love your videos dude keep doing this you're awesome!
Great video as always H.S, thanks again!
Hey Mr HackerSploit, thanks 👍
Much love from share
Hackersploit is best english hacking channel 😎
I Love each and every video you make. You are wiki to me,Thank a lot.!!
Sir Make Series On Forensic Investigation.
sir can you please tell me why everyone here with a foreign name says sir?
I was actually waiting for a tutorial on clearing logs as nothing good was available online.
Thanks for refreshing my mind with the commands on the video Do you have a video starting in ethical hacking?
Do the windows one, it's going to be fun to learn
Shredding important log files is not preventing the system to work as intended ?! Lets suppose i am pentesting a Linux Machine ,Is it not easier to backup all the log files at the exact moment when i log into the machine ,And after my changes in the FIlesystem ,I simply replaced the modified log files with the original one ? ( Ofc deleting the later generated entrys from the log files like auth.log and .bash_history , etc )
This is actually a clever idea
Command history is appended to the file whose path is stored in the variable "$HISTFILE", but only AFTER you have ended your session. HISTFILE is automatically set to ~/.bash_history for each new shell.
TL;DR
Just type HISTFILE=/dev/null when you're hacking and nothing will be saved in .bash_history
clever
Clearing logs 99% of times is not allowed in a pentest since if there is a real attacker his defense can argue that logs are admissible since the company pentester or third party pentester tempered with logs also the use of rootkits and code injection in product source code since it has major impact so pentestos always limited somehow and before you go clear logs be 100% you have permission written permission since it's not a joke
Next time, use commas.
Not using commas creates an unnecessary mental overhead for people trying to understand you.
This is for both pentesters and people who just want to mess around with cybersecurity.
I apologise for not using commas, you are absolutely right.
I appreciate the video sir alexis! :) how about tracks on the remote computer?
Very useful and awesome video
This is actually important.
Starts from 4:44
I know this is easy to over look but shred relies on an important assumption. That is, A file system overwrites the data in place which isn't the case in all of the present day file systems(Xfs , ext3 or raid-based file systems in some case's)
Just a heads up for someone who is going to try this.
Can you explain please? Also, what would be a better alternative?
We learned a lot, thanks
Is there a way to prevent these logs from being stored in the first place?
In Arch Linux, the directory /var/log/journal/ is a part of the systemd package, and the journal (when Storage= is set to auto in /etc/systemd/journald.conf) will write to /var/log/journal/. If that directory is deleted, systemd will not recreate it automatically and instead will write its logs to /run/systemd/journal in a nonpersistent way. However, the folder will be recreated if Storage=persistent is added to journald.conf and systemd-journald.service (the logging service) is restarted (or the system is rebooted). (Directly from archlinux wiki) and on other systems which logging is a service stackoverflow.com/questions/17358499/linux-how-to-disable-all-log read this. But I don't know how reliable is this method.
great video ,thanks
ALL INTEGRATED CIRCUTS SHOW TRACKS AND IS DOWNLOADABLE FOR USE IN ANY DIRECTION AND THEN IT'S ANALYZED FOR BEHAVIOR COOL RIGHT
شرح اكثر من رائع :)
Please do make the windows and macOS version next, it would be nice while the knowledge is fresh :-)
Can you make a video on how submit report after pent testing?
Cheers Mate.
the program shred the files, should have a amnesic part that forget how it had over write the file. kind of using rust or nim and no c or c++ that use other part of memory to do a new task.
Thanks vety useful
How to clear ufw.log file, kern.log and syslog.
What happened with the evil twin second video?
Nice tutorial! Is it also valid for SSD?
Yes.
After giving the command " shred - vfzu auth.log". It shows "Shred : auth log failed to open for writing: operation not permitted "
Kindly give the solution
Excellent!
what about journal logs? pretty important
so i have to shred all the file that have a .log in my linux to make it clean?
Oh man..!! That's alot. ✊✊Thank you.!
Since there is no Windows video yet, does anyone knows an alternative for windows machines?
If your on live os , this aint needed , anyway good informative vid !💯
Does overwriting the file with null can't be recovered????
Great vid but my eyes went straight to one of your tags "Foresnics" :P
When are you going to explain about why you use Linux since you've said before beginning a netstat tutorial commands.
Plz help me , i have a problem , when i use python for cupp.py , error and say : File cupp.py, line 40, in
import urllib.error
import error : no module named error
, help me plz
If you're using Python3 make sure you have pip installed and try running "pip3 install urllib3". Then try and run cuppy.py again.
make video SS7
thank you
PAX invictus , namaste !
but why not just put all to 1 or 0 . all. the file size.
How can I done it in Android termux
okay i agree about clearing logs and backdoors! but how if the forensics team recover all the deleted data over the device! its just an old trick now the nsa have a big technology helping them to finding the hackers like over communication gsm-line but if you hack the server and exploit the root privileges to editing the virtual ip it will be fine!
Gracias!
1.hey Hackersploit can you tell me something about this LAN tap all ATM machines are working on LAN is this possible to sniff ATM transaction
2. is that possible Hackers can intercept ATM machine that i am using for my transaction ???
why is the file renamed to 000000 then 00000 then 0000 then...
It is creating multiple overwriting with random 1s and 0s in other to get rid of the file.
More of writing 20 words on a tiny piece of paper to overwrite the previous.
At that point I guess the content of the file (data block) is already overwritten. It's just overwriting the name of the file in disk index block.
@@jiangyi19850130 probably, but am also not sure about that
macos getting popular among pentesters?
could someone explain this
Mac os? where?
How can I replace windows 10 with kali linux 2018.4 permanently help me plzz upload video
if you don't know how to do that don't even get Kali
For Windows also..
is every site vulnerable for sql injection or not ??
No
Sufian Dadiani how can you be sure ?
Because i pentest and ive tried before
Sufian Dadiani are you a pentester ?
plushoom what attacks are used by hacker nowadays for accesing database ? can you list them ?
Great
Just wow
Hey Alexis , Please make videos with white terminal..Finding it difficult to watch.
#NOTIFICATIONSQUAD
In India it takes 30,000 rupees to learn ethical hacking, basically you're a life saver, love you bro ❤😘
How to do on windows 10 ??
Some of the stuff seen in these videos can be done on Windows, but you'd probably have better luck in a Linux environment. I'd recommend installing Linux in a Virtual Machine if you're able to. It won't cost you any money, and you won't need to get rid of Windows ether. You'll have a way better time following along with these videos if you do.
Windows is calling home in real time once having network. Not possible
Очень много говорит и очень мало делает
#02Presiden_RI1
#INAelectionObserverSOS
#IndonesiaCallsCarterCenter
#INAelectionObserverSOS90TURKI
#CYBERMUSLIMRUSSIANFORPRABOWOSOS
5 minute only speak hmm
YOU SHOULD REALLY PLAY PUBG
No just no.
#NOTIFICATIONSQUAD