Commonly overlooked audit trails on intrusions. This is my attempt of compiling a ‘top list’ of audit trails that are being left after intrusions where the intruders try to cover their tracks but don’t do a good job. To put it short, there are actually a lot of audit trails on a normal UNIX system, which can almost all be overcome, but with some effort, that most intruders evade.
You can download it from the following link: https://packetstormsecurity.com/files/download/11257/logs.txt
Source: https://packetstormsecurity.com/files/11257/logs.txt.html

