Delete Logs in Hacked System

<p>Welcome to this new article, today I am going to show you how to clean your traces of a hacked computer, to be able to operate without your commands or your actions within the system are recorded in the system logs.</p> <p>To demonstrate this I will use two tools, one is created for use in Linux systems, created in Rust, and finally another tool created for use in Windows, created in Powershell.</p> <p>This type of tool is very useful because if you do not use these tools you leave traces everywhere and logically it is very dangerous for a forensic to start detecting your steps and find you.</p> <h1>MoonWalk</h1> <p>This is the first tool, this is the one that is for use on Linux systems and that is created in Rust. This is the repository</p> <p><strong>moonwalk</strong>&nbsp;is a 400 KB single-binary executable that can clear your traces while penetration testing a&nbsp;<strong>Unix</strong>&nbsp;machine. It saves the state of system logs pre-exploitation and reverts that state including the filesystem timestamps post-exploitation leaving zero traces of a&nbsp;<em>ghost in the shell</em>.</p> <p><a href="https://medium.com/@s12deff/delete-logs-in-hacked-system-658b3334b804">Read More</a></p>