Reading 28 - Foodisthebest/401-Reading-Notes GitHub Wiki
Readings: Log Clearing
Below you will find reading materials and additional resources that support today’s topic and the upcoming lecture.
Review the Submission Instructions for guidance on completing and submitting this assignment.
Reading
Explain some specifics of why a hacker might want to clear log files to a family member. Do not use the example from the article.
- Hackers want to avoid detection when committing crimes like using ransomware. For example, a hacker would want to delete log files to hide where they went on your system and what methods they used to lock up your files, like the exact commands used to perform these tasks.
What are three methods by which you can clear logs in a Windows system?
- Clearlogs.exe
- Meterpreter
- Windows Even Viewer
What are the four steps in the process of covering your tracks?
- Disable auditing
- Clearing logs
- Modifying logs
- Erasing command history
Bookmark and Review
NIST SP800-154 Guide to Data-Centric Threat Modeling
Things I Want to Know More About
The process of how hackers cover their tracks and what commands are commonly used by bad actors.