For Example:
Ex: $0 -h
* To show this help message
Ex: $0 -i 192.168.1.7
* To search 192.168.1.7 in all logs files. Basically finding which logs files have trace of it, and
* In addition to that, search all log files (/var/log/*) and show Top 20 most logged IP’s in log files.
* They could be good choices for spoofing
Ex: $0 -d 192.168.1.7 -s 10.1.1.7 -u “cracker”
* To delete lines containing 192.168.1.7 and|or user_name “cracker” from ASCII files, and
* To spoof 192.168.1.7 in non-ASCII files by 10.1.1.7 and user_name “cracker” by “root”
Ex: $0 -d 192.168.1.7 -s 10.1.1.7 -u “cracker” -w “/var/www/xyz.com/uploads/c99.php”
* To delete lines containing 192.168.1.7 and|or user_name “cracker” and|or web_shell_path from ASCII files, and
* To spoof 192.168.1.7 in non-ASCII files by 10.1.1.7 and user_name “cracker” by “root”
Ex: $0 -f
* To erase all log files listed in log_files.sh completely (not recommended)
Ex: $0 -e “php txt asp” -r /var/www
* To search for probable web backdoors planted on system. Once found, it is recommended to verify the result
* The current example searches for files having extensions php or txt or asp in /var/www and subdirectories
* Extensions and web_root_directory are customizable
Linux-Log-Eraser (10.5 KiB, 7 hits)作者: 耗子艾丽莎 时间: 2014-7-18 17:56