Cover SSH Tracks in CentOS5.

Discussion about hacker.org's server
Post Reply
Devilish
Posts: 4
Joined: Wed Jan 28, 2009 3:43 pm

Cover SSH Tracks in CentOS5.

Post by Devilish »

Hi guys,

I have access to box1, and box2 via SSH key. Passwords have been changed, but thankfully SSH key is going to let me in.

I'm going to use box2 to SSH to box1 using the key, and then backup /var/www/html to box2, and then cover my tracks by using something to modify the logs and come back to box2. Then I download everything off box2, and cover tracks on box2 as well.

I need help in finding ways to modify the log files instead of deleting them. Please help.
Devilish
Posts: 4
Joined: Wed Jan 28, 2009 3:43 pm

Post by Devilish »

Also, after going through the various pages of this forum, it seems to me that most of you are a helpful bunch, which I appreciate and which is why I've put forth my question.

I'm not aware of any tools or where to get them currently.
Devilish
Posts: 4
Joined: Wed Jan 28, 2009 3:43 pm

Post by Devilish »

Nobody?
Wow, even this stupid thread got attention and mine didn't for it's educational purpose? :(
plope0726
Posts: 826
Joined: Mon Dec 15, 2008 10:13 pm

Post by plope0726 »

Need more info on your intent.

It sounds like you are trying to steal information from a computer that is not yours and you do not have authorization to access and then cover your tracks so that you wont get caught....If this is the case no here is going to help you.
Devilish
Posts: 4
Joined: Wed Jan 28, 2009 3:43 pm

Post by Devilish »

plope0726 wrote:Need more info on your intent.

It sounds like you are trying to steal information from a computer that is not yours and you do not have authorization to access and then cover your tracks so that you wont get caught....If this is the case no here is going to help you.
Ah, I see now. I kinda noticed that people didn't even see my intent (not too many thread views)
Either way, it's the other way around.

I've put the past 2 years and worked with someone to get things worked out, a client/server app basically. Instead of paying, the guy changed the passwords on me. (How else would I get the ssh key? :) ) Now, I want to go back in there, take what is mine, and cover it back up. I could go ahead and be malicious as well, ans remove it all.. but I'm waiting for the right time for it.

You might wonder why I need to cover. Because if I don't cover, trademarks, IP gets involved. No problem with that, and I can prove what I rightfully made, but when trademarks and IP stuff starts rolling, it's almost like a law suit where things will go on for months on end with no solution in sight.
Post Reply