401 Reading 28 - marsecguy/reading-notes-cyberops GitHub Wiki
Log Clearing
-
Explain some specifics of why a hacker might want to clear log files to a family member. Do not use the example from the article.
- Logs create a record of what happened. much like evidence at a crime scene. Like crime scene evidence, a good cybersecurity "detective" can examine the clues and figure out what happened and who is responsible. As such, clearing log files can be thought of similarly as a perpetrator trying to clean the scene after a crime. They want to get rid of things like fingerprints to obfuscate what they did and prevent being caught. Logs can be like a fingerprint, in the respect that they can be used to identify the attacker. So, clearing logs is an attempt to similarly hide what was done and by whom.
-
What are three methods by which you can clear logs in a Windows system?
- Clearlogs.exe
- Use Meterpreter
- Through the Windows Event Viewer
-
What are the four steps in the process of covering your tracks.
- Disable auditing
- Clearing logs
- Modifying logs
- Deleting commands
Source: INFOSEC