Anti-Forensics
Account Misuse
Clear Browser Artifacts
Clear Email Artifacts
Decrease Privileges
Delayed Execution Triggers
Delete User Account
Deletion of Volume Shadow Copy
Disk Wiping
File Deletion
File Encryption
Hide Artifacts
Hiding or Destroying Command History
Log Deletion
Log Modification
Modify Windows Registry
Network Obfuscation
Physical Destruction of Storage Media
Physical Removal of Disk Storage
Stalling
Steganography
System Shutdown
Timestomping
Tripwires
Uninstalling Software
Virtualization
Windows System Time Modification
- ID: AF001
- Created: 25th May 2024
- Updated: 14th July 2025
- Platforms: WindowsLinuxMacOS
- Contributor: The ITM Team
Hiding or Destroying Command History
A subject clears, hides, or suppresses command history to prevent executed commands from being reviewed, disclosing information about the subject’s activities.
Subsections (3)
| ID | Name | Description |
|---|---|---|
| AF001.002 | Clear Bash History | A subject clears bash terminal command history to prevent executed commands from being reviewed, disclosing information about the subject’s activities. The Command Prompt on Windows only stores command history within the current session, once Command Prompt is closed, the history is lost. On Linux-based operating systems different terminal software may store command history in various locations, with the most common being On MacOS the Terminal utility will write command history to |
| AF001.001 | Clear PowerShell History | A subject clears PowerShell command history to prevent executed commands from being reviewed, disclosing information about the subject’s activities. PowerShell stores command history in the context of a user account. This file is located at A subject can delete their own A subject may attempt to use the |
| AF001.003 | PYTHONHISTORY Environment Variable Null | A subject modifies the
This can be achieved on a per-session basis using the command |