You are using a binary file payload delivery from a FTP server during a bounce attack to breach a network.
Which of these logs would you modify/corrupt to stop the network administrator from identifying the source of the attack?
Options
- Crash Log
- Session Log
- Error Log
- None of these