Skip to Main Content
Hands-On Penetration Testing with Kali NetHunter
book

Hands-On Penetration Testing with Kali NetHunter

by Glen D. Singh, Sean-Philip Oriyano
February 2019
Beginner to intermediate content levelBeginner to intermediate
302 pages
7h 58m
English
Packt Publishing
Content preview from Hands-On Penetration Testing with Kali NetHunter

Clearing logs in Linux

As with all operating systems, logs are also generated and stored on Linux-based systems. Log files are the records of all activities that took place on a system. The following are the general locations of the Linux log files:

The following are additional log locations on Linux systems:

  • Example 1: Clearing logs using null

In this example, we are going to use null, a non-existent object, to remove the contents of a file. We are going to clear the logs of the Apache access.log file on a Linux system. A null object is ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hands-On AWS Penetration Testing with Kali Linux

Hands-On AWS Penetration Testing with Kali Linux

Karl Gilbert Gupta, Benjamin Caudill
Web Penetration Testing with Kali Linux - Third Edition

Web Penetration Testing with Kali Linux - Third Edition

Gilberto Najera-Gutierrez, Juned Ahmed Ansari

Publisher Resources

ISBN: 9781788995177OtherErrata PagePurchase Link