Anti-Forensic Technique

Comments · 356 Views

What is cyber/digital forensics?
The process of collecting, inspecting, interpreting, reporting, and presenting digital evidence is known as cyber forensics. A process of examining, acquiring, and analyzing data from a device or a system into physical documentation for proof. It is a d

 

There are different types of computer forensics that happen depending on the field in which it needs to be investigated: Network forensics, Email forensics, Malware forensics, Memory forensics, Mobile Phone forensics, Database forensics, Disk forensics, etc.

 

What is Anti forensics?

Anti-forensics are techniques used to obstruct forensic analysis. Considering the number of cybercrimes happening, anti-forensic techniques seem to be utilized more to buy time or prevent from getting caught by the officers. A more abbreviated definition is given by Scott Berinato in his article entitled, The Rise of Anti-Forensics. "Anti-forensics is more than technology. It is an approach to criminal hacking that can be summed up like this: Make it hard for them to find you and impossible for them to prove they found you." Anti-forensic techniques are purely malicious in intent and design. It’s the process of criminals to make the investigation very difficult for forensic experts and or to destroy the evidence.

List of Anti-forensic techniques:

  1.     Data hiding: Making data inaccessible.
  2.     Disk wiping: Deleting all files on a drive or media storage.
  3.     Falsification of data: Forgery of data, without having access to the relevant/ authenticated information
  4.     Data deletion and physical destruction
  5.     Encryption
  6.     Online anonymity
  7.     Trail blackout: To mislead, complicate, disorient and distract the investigation method.
  8.     Buffer overflow against forensic tools.
  9.     Steganography
  10. Compression
  11. Overwriting data
  12. Malware

 

Conclusion:

The above listed anti-forensic techniques can be improved with consistent monitoring of the system or by fixing the bugs in the tools. However, being aware and skilled of your computer forensic methodologies will help you fight against these anti forensic techniques and will grant results.

Comments