Class Read 28: Log Clearing - taylortommy23/401-Reading-Notes GitHub Wiki
Explain some specifics of why a hacker might want to clear log files to a family member. Do not use the example from the article.
- Clearing log files to a family member serves to protect both the hacker and their family from the repercussions of their actions while maintaining control and avoiding detection within the compromised system or network.
What are three methods by which you can clear logs in a Windows system?
- By using event viewer, command prompt and powershell.
What are the four steps in the process of covering your tracks.
- Concealment: The first step is to hide or obscure evidence of the actions taken. This might involve deleting files, destroying physical evidence, or altering records to make it difficult for others to trace back to the original action.
Misdirection: This step involves creating false leads or trails to divert attention away from the actual actions taken. This could include planting false information, creating alibis, or framing someone else for the actions.
Obfuscation: Obfuscation involves making the evidence or trail difficult to interpret or follow. This might involve using encryption, code words, or other forms of communication that are difficult for others to decipher.
Normalization: Once the immediate threat of detection has passed, the final step is to reintegrate into normal activities to avoid suspicion. This might involve behaving as usual, maintaining regular routines, and avoiding drawing attention to oneself.
Resources: Chat GPT https://resources.infosecinstitute.com/topics/hacking/ethical-hacking-log-tampering-101/