docs: command description
parent
c580f0b9e4
commit
ef36249ba7
|
@ -5,7 +5,7 @@
|
||||||
|
|
||||||
### About
|
### About
|
||||||
|
|
||||||
Covermyass is a post-exploitation tool to cover your tracks on various operating systems (Linux, Darwin, Windows, ...). It was designed for penetration testing "covering tracks" phase, before exiting the infected server. At any time, you can run the tool to find which log files exists on the system, then run again later to erase those files. The tool will tell you which file can be erased with the current user permissions.
|
Covermyass is a post-exploitation tool to cover your tracks on various operating systems (Linux, Darwin, Windows, ...). It was designed for penetration testing "covering tracks" phase, before exiting the infected server. At any time, you can run the tool to find which log files exists on the system, then run again later to erase those files. The tool will tell you which file can be erased with the current user permissions. Files are overwritten repeatedly with random data, in order to make it harder for even very expensive hardware probing to recover the data.
|
||||||
|
|
||||||
## Installation
|
## Installation
|
||||||
|
|
||||||
|
|
|
@ -23,7 +23,7 @@ func NewRootCmd() *cobra.Command {
|
||||||
cmd := &cobra.Command{
|
cmd := &cobra.Command{
|
||||||
Use: "covermyass",
|
Use: "covermyass",
|
||||||
Short: "Post-exploitation tool for covering tracks on Linux, Darwin and Windows.",
|
Short: "Post-exploitation tool for covering tracks on Linux, Darwin and Windows.",
|
||||||
Long: "Covermyass is a post-exploitation tool for pen-testers that finds then erases log files on the current machine. The tool scans the filesystem and look for known log files that can be erased. Running this tool with root privileges is safe and even recommended to avoid access permission errors. This tool does not perform any network call.",
|
Long: "Covermyass is a post-exploitation tool for pen-testers that finds then erases log files on the current machine. The tool scans the filesystem and look for known log files that can be erased. Files are overwritten multiple times with random data, in order to make it harder for even very expensive hardware probing to recover the data. Running this tool with root privileges is safe and even recommended to avoid access permission errors. This tool does not perform any network call.",
|
||||||
Example: "covermyass --write -p /db/*.log\n" +
|
Example: "covermyass --write -p /db/*.log\n" +
|
||||||
"covermyass --list -p /db/**/*.log",
|
"covermyass --list -p /db/**/*.log",
|
||||||
Version: build.String(),
|
Version: build.String(),
|
||||||
|
|
Loading…
Reference in New Issue