diff --git a/README.md b/README.md index eba1bbf..3ef1b6a 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@ ### About -Covermyass is a post-exploitation tool to cover your tracks on various operating systems (Linux, Darwin, Windows, ...). It was designed for penetration testing "covering tracks" phase, before exiting the infected server. At any time, you can run the tool to find which log files exists on the system, then run again later to erase those files. The tool will tell you which file can be erased with the current user permissions. +Covermyass is a post-exploitation tool to cover your tracks on various operating systems (Linux, Darwin, Windows, ...). It was designed for penetration testing "covering tracks" phase, before exiting the infected server. At any time, you can run the tool to find which log files exists on the system, then run again later to erase those files. The tool will tell you which file can be erased with the current user permissions. Files are overwritten repeatedly with random data, in order to make it harder for even very expensive hardware probing to recover the data. ## Installation diff --git a/cmd/root.go b/cmd/root.go index da0419b..181a1b6 100644 --- a/cmd/root.go +++ b/cmd/root.go @@ -23,7 +23,7 @@ func NewRootCmd() *cobra.Command { cmd := &cobra.Command{ Use: "covermyass", Short: "Post-exploitation tool for covering tracks on Linux, Darwin and Windows.", - Long: "Covermyass is a post-exploitation tool for pen-testers that finds then erases log files on the current machine. The tool scans the filesystem and look for known log files that can be erased. Running this tool with root privileges is safe and even recommended to avoid access permission errors. This tool does not perform any network call.", + Long: "Covermyass is a post-exploitation tool for pen-testers that finds then erases log files on the current machine. The tool scans the filesystem and look for known log files that can be erased. Files are overwritten multiple times with random data, in order to make it harder for even very expensive hardware probing to recover the data. Running this tool with root privileges is safe and even recommended to avoid access permission errors. This tool does not perform any network call.", Example: "covermyass --write -p /db/*.log\n" + "covermyass --list -p /db/**/*.log", Version: build.String(),