Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
59 views31 pages

CF&IR Anti Forensic Practices

The document discusses anti-forensic practices, which are techniques used to damage, erase, or modify digital evidence to obstruct forensic investigations. It categorizes these practices into data wiping, trail obfuscation, spoofing, encryption, and data hiding, highlighting their implications for cybercrime investigations. Understanding these practices is essential for enhancing forensic methods and maintaining evidence integrity in the face of evolving cyber threats.

Uploaded by

7601nandu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views31 pages

CF&IR Anti Forensic Practices

The document discusses anti-forensic practices, which are techniques used to damage, erase, or modify digital evidence to obstruct forensic investigations. It categorizes these practices into data wiping, trail obfuscation, spoofing, encryption, and data hiding, highlighting their implications for cybercrime investigations. Understanding these practices is essential for enhancing forensic methods and maintaining evidence integrity in the face of evolving cyber threats.

Uploaded by

7601nandu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Anti-forensic Practices

SINI N

M1-IS, CET

13/12/2024

Course Name: CYBER FORENSICS AND INCIDENT RESPONSE

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 1 / 28


Outline

1 Introduction

2 Anti-forensic Practices

3 Conclusion

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 2 / 28


INTRODUCTION

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 3 / 28


What is Cyber Forensics ?

Cyber forensics is the process of investigating and analyzing digital


devices to collect and preserve evidence in a way that is admissible in
court.

Forensics is the practice of identifying, collecting, preserving,


analyzing, and documenting digital evidence.

Cyber forensics plays a major and crucial role in cybercrime


investigations.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 4 / 28


What is Anti-forensics?

Anti-forensics are a collection


of tools and techniques that are
used to damage, erase, or
modify data that obstructs the
normal forensic examination.

Anti-forensic measures
performed on a device will harm
the integrity of the data and
could compromise the
investigation.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 5 / 28


Anti-forensics Basics

The aim of anti-forensics is to reduce the quality and quantity of


forensic artifacts present on the disk.

Anti-forensic measures employed by cybercriminals significantly


complicate the work of forensic investigators.

Both hackers and regular users may use anti-forensic methods, but
their intentions are very different.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 6 / 28


Anti-forensics Basics Conti....

To qualify as an anti-forensic tool or technique, it must meet one or more


of the following criteria:

1. Attack the Data: Modify, delete, or hide data to prevent analysis.

2. Attack Forensic Tools: Exploit weaknesses in forensic software to


disrupt investigations.

3. Attack the Investigator’s Work: Mislead or obstruct the


investigator’s analysis process.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 7 / 28


Anti-forensic Practices

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 8 / 28


Anti-forensic Practices/Techniques

Cyber forensic experts classify anti-forensic techniques into 4 main


categories based on their functions.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 9 / 28


1. Data Wiping

Wiping is also referred to as Digital shredding or Erasing.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 10 / 28


1. Data Wiping

Wiping is also referred to as Digital shredding or Erasing.

What is Data Wiping?

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 10 / 28


What is Data Wiping

Data wiping means erasing all data on a hard drive by overwriting it


with random data.

It ensures the data cannot be recovered.

Simply deleting files or formatting a disk does not truly erase data.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 11 / 28


How Does Data Wiping Work?

As per the protocols laid out by the Department of Defense (DoD), data
overwriting is performed multiple times, typically using methods such as
the 3-pass or 7-pass techniques.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 12 / 28


How Does Data Wiping Work?

As per the protocols laid out by the Department of Defense (DoD), data
overwriting is performed multiple times, typically using methods such as
the 3-pass or 7-pass techniques.
3-Pass Overwrite (DoD 5220.22-M):

Overwrite with 0s.


Overwrite with 1s.
Overwrite with random characters.

Final verification confirms success.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 12 / 28


How Does Data Wiping Work?

As per the protocols laid out by the Department of Defense (DoD), data
overwriting is performed multiple times, typically using methods such as
the 3-pass or 7-pass techniques.
3-Pass Overwrite (DoD 5220.22-M):

Overwrite with 0s.


Overwrite with 1s.
Overwrite with random characters.

Final verification confirms success.


7-Pass Overwrite (DoD 5220.22-M ECE):
Follows the 3-pass method but adds extra overwriting steps with
random data.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 12 / 28


Why data wiping ?

Wiping effectively removes all data from a system.

Many open-source and commercial tools are available for data wiping.

Examples of tools include Eraser and USB Oblivion.

However, research shows that some tools may leave data fragments
on the system.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 13 / 28


Data Wiping Tools

The tools used for data wiping are the following:

USB Oblivion
USB Oblivion removes all traces of connected USB drives and
CD-ROMs from the Windows Registry.

Eraser
Eraser is an open-source Windows tool that securely removes sensitive
data.
It overwrites the data multiple times with specific patterns to ensure
complete removal.

Disk Wipe
It is an open-source portable Windows tool for permanently erasing
data.
It deletes all disk data and prevents its recovery.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 14 / 28


Data Remanence

Residual data left on a disk after deletion is called data remanence.

Modern anti-forensic tools and techniques ensure minimal data


fragments remain on a system.

In rare cases, some fragments may be found, but without sufficient


details, it is difficult to reconstruct meaningful evidence.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 15 / 28


Degaussing

Degaussing is a data-wiping method that uses strong electromagnets


to erase data from a disk.
It is a form of demagnetizing, where the device is exposed to a
fluctuating, strong magnetic field to reset it to a magnetically neutral
state.
The electromagnetic field disrupts and randomizes the magnetic
patterns that store data, effectively erasing data.
The device’s magnetic alignment is restructured, making data
recovery nearly impossible.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 16 / 28


Types of Degaussers
1. Coil Degaussers:
Use a steel core wrapped in copper wire to generate alternating
electromagnetic fields.

Generate high heat; which permits short operational cycles to prevent


overheating.

2. Capacitive Discharge Degaussers:

Use capacitors to store energy, Once fully charged, capacitors release


energy to the coil which creates a very intense electromagnetic
impulse.

3. Permanent Magnet Degaussers:

It possess no electrical component; hence they can be run non-stop.


Depending upon the size of magnets, the degaussers offer a greater
intensity of the magnetic field.
SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 17 / 28
Degaussing Facts

Effectiveness
Data recovery from a hard drive after degaussing is nearly impossible.

Limitations:
Solid-State Drives (SSDs) are immune to degaussing as they do not rely

Market Options:
A variety of commercial and DIY degaussers are available.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 18 / 28


2. Trail Obfuscation

A method used by cybercriminals to mislead investigations by


manipulating evidence.

Aims to confuse and misdirect forensic investigators.

Purpose:

Prevents investigators from tracing the activities of cybercriminals.

Example :
VPN software like TunnelBlick to mask IP addresses and hide online
activity.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 19 / 28


Spoofing

A technique where hackers pretend to be someone else by altering


their IP or MAC address.

Used to hide credentials or mislead investigators.

Purpose:

Conceal identity.

Mislead forensic investigations.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 20 / 28


Types of Spoofing

1. IP Spoofing:

Alters the IP address to random or specified values.

Easy to implement using tools or manually.

Commonly employed by hackers.

2. MAC Spoofing:

Modifies the device’s MAC address for enhanced anonymity.

Less common but offers better identity concealment than IP spoofing.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 21 / 28


Data Modification

This technique manipulates the metadata and timestamps of the


data, thereby creating obstructions in an investigation.

A simple timestamp modification can affect the timeline analysis of a


case.

Manipulating metadata can be equally disruptive, as it may


completely remove the forensically significant data.
Timestamp is the metadata that logs the file information that
includes the time and date of a file’s creation, modification, and
access.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 22 / 28


3. Encryption

This is the first and original method of anti-forensics.

It is a cryptographic process that converts readable data into


unreadable data.

Advanced encryption protocols and standards are being developed to


improve privacy protection.

VeraCrypt: Open-source disk encryption software, supports Windows,


Linux, and macOS.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 23 / 28


4. Data Hiding

A technique used to conceal sensitive data from investigators.

They hide their sensitive data in a Host Protected Area (HPA), Slack
space, and Alternate Data Streams (ADS) since these areas are not
included in any search parameters

cryptography and steganography

Steganography hides/conceals the information within carriers like


images, audios, spam, etc.

SilentEye is an open source tool used for steganography.

cryptography is about hiding the contents of a message to an


unreadable format using algorithms like RSA, AES, DES

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 24 / 28


Conclusion

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 25 / 28


Conclusion

Anti-forensic practices aim to erase, hide, or manipulate digital


evidence, posing significant challenges to forensic investigations.

Techniques like data wiping, trail obfuscation, spoofing, encryption,


and data hiding require investigators to adopt advanced tools and
strategies.

As technology evolves, so do these techniques, driving innovation in


forensic sciences.

Understanding anti-forensics is essential to enhance investigation


methods, safeguard evidence integrity, and ensure justice against
increasing cyber threats.

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 26 / 28


References

1 TEXTBOOK : Practical Cyber Forensics An Incident-Based Approach


to Forensic Investigations - Niranjan Reddy

2 https://www.linkedin.com/pulse/anti-forensic-techniques-i-dfir-i-rem-
i-mssp-i-threat-hunting-3dbxf

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 27 / 28


Thank you

SINI N (M1-IS, CET) Anti-forensic Practices 13/12/2024 28 / 28

You might also like