SlideShare uma empresa Scribd logo
1 de 14
Anti – Computer Forensic
What is Anti-Forensic
• Anti-forensics is more than technology. It is an
approach to criminal hacking that can be
summed up like this: Make it hard for them to
find you and impossible for them to prove
they found you.”
Sub Categories
•
•
•
•

data hiding
artifact wiping
trail obfuscation
attacks against the CF (computer forensics)
processes
• Tools – Counter Forensics
Purpose & Goals
• purely malicious in intent and design
• should be used to illustrate deficiencies in
digital forensic procedures, digital forensic
tools, and forensic examiner education –
– 2005 Black Hat Conference by anti-forensic
authors – James Foster & Vinnie Liu.
– forensic investigators will have to work harder to
prove that collected evidence is both accurate and
dependable.
Data Hiding
• process of making data difficult to find while also
keeping it accessible for future use.
• encryption, steganography and other various
forms of hardware/software based data
concealment
• different data hiding methods makes digital
forensic examinations difficult
• When the different data hiding methods are
combined, they can make a successful forensic
investigation nearly impossible
Encryption
• commonly used techniques to defeat
computer forensics is data encryption.
• Presentation on encryption and anti-forensic
methodologies the Vice President of Secure
Computing, Paul Henry, referred
to encryption as a “forensic analyst's
nightmare”.
• publicly available encryption program
• Through the use of modern encryption
algorithms and various encryption techniques
these programs make the data virtually
impossible to read without the designated key
Steganography
• information or files are hidden within another
file in an attempt to hide data by leaving it in
plain sight.
• “Steganography produces dark data that is
typically buried within light data (e.g., a nonperceptible digital watermark buried within a
digital photograph).”
• steganography has the capability of disrupting
the forensic process when used correctly
Other Form of Data Hiding
• tools and techniques to hide data throughout
various locations in a computer system
• memory, slack space, hidden directories, bad
blocks, alternate data streams, (and) hidden
partitions.
1) Slacker - breaks up a file and places each piece of
that file into the slack space of other files.
2) bad sectors. To perform this technique, the user
changes a particular sector from good to bad and
then data is placed onto that particular cluster
Artifact Wiping
•
-

Disk Cleaning Utilities
DBAN
SRM
BC Wipe
Total Wipeout
KillDisk
PC Inspector
Cyber scrub
CyberCide
CMRR Secure Erase (Approved By NIST & NSA)
Artifact Wiping
• File Wiping Utilities
- BC Wipe
- R-Wipe & Clean
- Eraser
- Aevita Wipe & Delete
- Cyberscrub Privacy Suite
• Disk Destruction Techniques
– magnetic field is applied to a digital media device
– device that is entirely clean of any previously
stored data
– NIST recommends that “physical destruction can
be accomplished using a variety of methods,
including disintegration, incineration, pulverizing,
shredding and melting.”
• Trail Obfuscation
– to confuse, disorientate and divert the forensic
examination process
– covers a variety of techniques and tools that
include “log cleaners, spoofing, misinformation,
backbone hopping, zombied accounts, trojan
commands.”
– Timestomp - gives the user the ability to modify
file metadata pertaining to access, creation and
modification times/dates.
• Transmogrify - allows the user to change the
header information of a file, so a (.jpg) header
could be changed to a (.doc) header
• allows the user to change the header
information of a file, so a (.jpg) header could
be changed to a (.doc) header

Mais conteúdo relacionado

Mais procurados

02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
Kranthi
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
Kranthi
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
Kranthi
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
Sagar Rahurkar
 

Mais procurados (20)

Network forensic
Network forensicNetwork forensic
Network forensic
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
data hiding techniques.ppt
data hiding techniques.pptdata hiding techniques.ppt
data hiding techniques.ppt
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Anti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifactsAnti forensics-techniques-for-browsing-artifacts
Anti forensics-techniques-for-browsing-artifacts
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
Windows registry forensics
Windows registry forensicsWindows registry forensics
Windows registry forensics
 
Windows forensic artifacts
Windows forensic artifactsWindows forensic artifacts
Windows forensic artifacts
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
Intro to cyber forensics
Intro to cyber forensicsIntro to cyber forensics
Intro to cyber forensics
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Processing Crimes and Incident Scenes
Processing Crimes and Incident ScenesProcessing Crimes and Incident Scenes
Processing Crimes and Incident Scenes
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...Digital Forensics best practices with the use of open source tools and admiss...
Digital Forensics best practices with the use of open source tools and admiss...
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 

Destaque

Destaque (7)

Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 
Digital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniquesDigital Anti-Forensics: Emerging trends in data transformation techniques
Digital Anti-Forensics: Emerging trends in data transformation techniques
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Anti-Forensic Rootkits
Anti-Forensic RootkitsAnti-Forensic Rootkits
Anti-Forensic Rootkits
 
Disco duro LOL
Disco duro LOLDisco duro LOL
Disco duro LOL
 
Investigating Malware using Memory Forensics
Investigating Malware using Memory ForensicsInvestigating Malware using Memory Forensics
Investigating Malware using Memory Forensics
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 

Semelhante a Anti forensic

Vest Forensics presentation owasp benelux days 2012 leuven
Vest Forensics presentation owasp benelux days 2012 leuvenVest Forensics presentation owasp benelux days 2012 leuven
Vest Forensics presentation owasp benelux days 2012 leuven
Marc Hullegie
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
Gnanavi2
 

Semelhante a Anti forensic (20)

Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
Vest Forensics presentation owasp benelux days 2012 leuven
Vest Forensics presentation owasp benelux days 2012 leuvenVest Forensics presentation owasp benelux days 2012 leuven
Vest Forensics presentation owasp benelux days 2012 leuven
 
Sujit
SujitSujit
Sujit
 
Computer Forensics Bootcamp
Computer Forensics BootcampComputer Forensics Bootcamp
Computer Forensics Bootcamp
 
File000117
File000117File000117
File000117
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
644205e3-8f85-43da-95ac-e4cbb6a7a406-150917105917-lva1-app6892.pdf
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Brief introduction to digital forensics
Brief introduction to digital forensics Brief introduction to digital forensics
Brief introduction to digital forensics
 
Dracos forensic flavor
Dracos forensic flavorDracos forensic flavor
Dracos forensic flavor
 
DracOs Forensic Flavor
DracOs Forensic FlavorDracOs Forensic Flavor
DracOs Forensic Flavor
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Cyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics LectureCyber Incident Response & Digital Forensics Lecture
Cyber Incident Response & Digital Forensics Lecture
 
SECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptxSECURITY OPERATION CENTER CONTENT.pptx
SECURITY OPERATION CENTER CONTENT.pptx
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Anti forensic

  • 1. Anti – Computer Forensic
  • 2. What is Anti-Forensic • Anti-forensics is more than technology. It is an approach to criminal hacking that can be summed up like this: Make it hard for them to find you and impossible for them to prove they found you.”
  • 3. Sub Categories • • • • data hiding artifact wiping trail obfuscation attacks against the CF (computer forensics) processes • Tools – Counter Forensics
  • 4. Purpose & Goals • purely malicious in intent and design • should be used to illustrate deficiencies in digital forensic procedures, digital forensic tools, and forensic examiner education – – 2005 Black Hat Conference by anti-forensic authors – James Foster & Vinnie Liu. – forensic investigators will have to work harder to prove that collected evidence is both accurate and dependable.
  • 5. Data Hiding • process of making data difficult to find while also keeping it accessible for future use. • encryption, steganography and other various forms of hardware/software based data concealment • different data hiding methods makes digital forensic examinations difficult • When the different data hiding methods are combined, they can make a successful forensic investigation nearly impossible
  • 6. Encryption • commonly used techniques to defeat computer forensics is data encryption. • Presentation on encryption and anti-forensic methodologies the Vice President of Secure Computing, Paul Henry, referred to encryption as a “forensic analyst's nightmare”.
  • 7. • publicly available encryption program • Through the use of modern encryption algorithms and various encryption techniques these programs make the data virtually impossible to read without the designated key
  • 8. Steganography • information or files are hidden within another file in an attempt to hide data by leaving it in plain sight. • “Steganography produces dark data that is typically buried within light data (e.g., a nonperceptible digital watermark buried within a digital photograph).” • steganography has the capability of disrupting the forensic process when used correctly
  • 9. Other Form of Data Hiding • tools and techniques to hide data throughout various locations in a computer system • memory, slack space, hidden directories, bad blocks, alternate data streams, (and) hidden partitions. 1) Slacker - breaks up a file and places each piece of that file into the slack space of other files. 2) bad sectors. To perform this technique, the user changes a particular sector from good to bad and then data is placed onto that particular cluster
  • 10. Artifact Wiping • - Disk Cleaning Utilities DBAN SRM BC Wipe Total Wipeout KillDisk PC Inspector Cyber scrub CyberCide CMRR Secure Erase (Approved By NIST & NSA)
  • 11. Artifact Wiping • File Wiping Utilities - BC Wipe - R-Wipe & Clean - Eraser - Aevita Wipe & Delete - Cyberscrub Privacy Suite
  • 12. • Disk Destruction Techniques – magnetic field is applied to a digital media device – device that is entirely clean of any previously stored data – NIST recommends that “physical destruction can be accomplished using a variety of methods, including disintegration, incineration, pulverizing, shredding and melting.”
  • 13. • Trail Obfuscation – to confuse, disorientate and divert the forensic examination process – covers a variety of techniques and tools that include “log cleaners, spoofing, misinformation, backbone hopping, zombied accounts, trojan commands.” – Timestomp - gives the user the ability to modify file metadata pertaining to access, creation and modification times/dates.
  • 14. • Transmogrify - allows the user to change the header information of a file, so a (.jpg) header could be changed to a (.doc) header • allows the user to change the header information of a file, so a (.jpg) header could be changed to a (.doc) header