Articles Blog | G5 Cyber Security

Research – logs.txt

Commonly overlooked audit trails on intrusions. This is my attempt of compiling a ‘top list’ of audit trails that are being left after intrusions where the intruders try to cover their tracks but don’t do a good job. To put it short, there are actually a lot of audit trails on a normal UNIX system, which can almost all be overcome, but with some effort, that most intruders evade.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/11257/logs.txt

Source: https://packetstormsecurity.com/files/11257/logs.txt.html

Exit mobile version