A penetration tester has gained user-level access through a remote code execution vulnerability UNIX server in the target network. The UNIX server's syslog daemon will record multiple failed login attempts. Also, the syslog files need modifying to avoid detection and conceal the penetration tester's presence. What first step must the penetration tester take to achieve this?
Attack complexity
Establish persistence
User interaction
Privileges required