Hi th3l4st, when you're in the post explotation one of the most important things it's evidences cleaning and there are diferent ways to accomplish them. Of course I assume that u're root due to the fact that those log files are privileged, some people delete them other people modify the files (I think that you're refering to modify with truncate).
For deleting the log files you can do diferent things from deleting them manually to writing a script (zapper) who searches and deletes the log files but I won't give you a source code because it won't help you, I recommend you to write your own scripts even more if you're interested in the process (everybody knows how to launch a script...) you can easily fill the log file with /dev/null.
You was asking about how many log files do you have to truncate, it depends on how did you accessed the system if you got in from a web issue you'll probably have to truncate server log files (apache or whatever it runs), if you had exploited a buffer overflow and it has broke the program probably you'll want to truncate the core dumps or the logs created at /var/log/messages in conclusion you have to pay attention on everything you do (bash history could betray you) access logs etc...
Here you have a list of log files and their location:
http://www.thegeekstuff.com/2011/08/linux-var-log-files/Most of the forensics use automated tools to analyze the log files (here you can start searching how they work and what log files they analyze for knowing what you have to modify or delete) mostly using string matching or regex you can confuse them by using strange ascii characters, commas, quotes, pipes or eLfL (it's 4 bytes header for Windows Event Logs) or replacing your IP address in the files or whatever you can think of.
Here you have a good presentation about anti-forensics techniques:
https://www.defcon.org/images/defcon-20/dc-20-presentations/Perklin/DEFCON-20-Perklin-AntiForensics.pdfIf you have any doubts i'll be pleased to help you
Sherlock3d