Description: This video is all about deleting logs from a compromised remote victims. We already know how to exploit a remote computer using metasploit and get meterpreter or shell. This video explains how to delete log files from windows after exploiting it remotely. The Event Log Service collect security,application and system events in event viewer. There are 3 types of event log in windows: Application log,Security log and System log.
To open Event Viewer, follow these steps:
Click Start, and then click Control Panel. Click Performance and Maintenance, then click Administrative Tools, and then double-click Computer Management. Or, open the MMC containing the Event Viewer snap-in. In the console tree, click Event Viewer.
Source : Hackveda from Youtube
Tags: metasploit ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Its important for covering the track.
All the videos are good from Hackveda.
Thanks for sharing.
Good Video Thanks for posting ;)
Video no longer exists.
Has anyone downloaded it?
Mind uploading?