Delete Logs in Hacked System
<p>Welcome to this new article, today I am going to show you how to clean your traces of a hacked computer, to be able to operate without your commands or your actions within the system are recorded in the system logs.</p>
<p>To demonstrate this I will use two tools, one is created for use in Linux systems, created in Rust, and finally another tool created for use in Windows, created in Powershell.</p>
<p>This type of tool is very useful because if you do not use these tools you leave traces everywhere and logically it is very dangerous for a forensic to start detecting your steps and find you.</p>
<h1>MoonWalk</h1>
<p>This is the first tool, this is the one that is for use on Linux systems and that is created in Rust. This is the repository</p>
<p><strong>moonwalk</strong> is a 400 KB single-binary executable that can clear your traces while penetration testing a <strong>Unix</strong> machine. It saves the state of system logs pre-exploitation and reverts that state including the filesystem timestamps post-exploitation leaving zero traces of a <em>ghost in the shell</em>.</p>
<p><a href="https://medium.com/@s12deff/delete-logs-in-hacked-system-658b3334b804">Read More</a></p>