Importance of Covering your tracks
Intro When we compromise the system using tools like metasploit or entering the system in a different way there are always records about our activity in the system that we were inspecting. Where are the records being stored? Logs Probably the first p...
Mar 20, 20255 min read22

