- October 24, 2019
- Posted by: cyberanalyst
- Category: Blog, CEH, Cyber-security and Ethical Hacking Training, Ethical Hacking and Kali Linux Free Training, Security
Another technique of covering tracks is clearing system logs. By clearing the logs, all the events logged during the compromise will be erased. It can be done by either using command line tools or through the control panel on windows platform.
- Go to control panel:
Windows Control Panel.
2.Click System and Security:
System and Security Options.
3. Click on Event Viewer.
4. Click Windows Log.
Here you can find different type of logs, such as application, setup, security, system and forwarded events.
You can import, export and clear these logs using Action section on the right panel.