Importance of Covering your tracks
Intro
When we compromise the system using tools like metasploit or entering the system in a different way there are always records about our activity in the system that we were inspecting.
Where are the records being stored?
Logs
Probably the first p...
cyberjourney.eu5 min read
Taji Abdullah
Nice write up!