CF Lecture 09 - Anti Forensics Techniques Part 2
CF Lecture 09 - Anti Forensics Techniques Part 2
Zunera Jalil
Email: [email protected]
Anti Forensics 2
• Data Deletion
• Password Protection
• Steganography
• Encryption
• Tunnelling
• Onion Routing
• Obfuscation
• Spoofing
Steganography 6
https://stylesuxx.github.io/steganography/
Example 10
Steganography 11
Steganography- Question 12
https://www.sciencedirect.com/science/article/abs/pii/S0379073819301082
Onion Routing 28
https://www.digitalforensics.com/blog/obfuscation-and-detection-techniques/
http://cet4862.pbworks.com/w/file/fetch/69342454/Craiger,%20Swauger,%20and%20Marberry.pdf
Obfuscation 31
https://info-savvy.com/anti-forensics-techniques-trail-obfuscation-artifact-wiping-encryption-
encrypted-network-protocols-and-program-packers/
Obfuscation 32
Spoofing 33
• IP Spoofing –
Perpetrators use a different IP address to hide their system’s IP address for
initiating malicious activities.
Generally, this type of spoofing intends to carry out a distributed denial of service
(DDoS).
It can be performed either manually or by the use of tools.
• MAC Spoofing –
MAC addresses usually cannot be changed, but with technical skills, it is not
impossible.
With MAC spoofing, cyber attackers use fake MAC addresses.
This is one of the difficult spoofing methods to counter.
Spoofing 35
• https://info-savvy.com/anti-forensics-techniques-that-minimize-footprint/
• https://www.anti-forensics.com/
• https://digital-forensics.enterprisesecuritymag.com/cxoinsight/evaluating-
challenges-and-impacts-of-antiforensics--nid-1054-cid-59.html
• https://repository.stcloudstate.edu/cgi/viewcontent.cgi?article=1145&context=msi
a_etds
• https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9116399
ANY QUESTIONS