Digital Forensics Investigation: Anti-Forensic Techniques Report

Verified

Added on  2022/09/09

|4
|794
|16
Report
AI Summary
This report explores anti-forensic techniques, which are methods used to obstruct digital investigations. It discusses how these techniques, including data hiding, artifact wiping, and attacks against forensic tools, are employed by cybercriminals. The report highlights the challenges these techniques pose to forensic experts, emphasizing the importance of understanding anti-forensic methods in cybercrime investigations. It covers the use of tools like VPNs, encryption, and the Metasploit framework's slacker to conceal evidence. The report also examines the evolving nature of anti-forensics and its implications for digital forensics, emphasizing the need for continuous learning and adaptation in this field. The conclusion underscores the significance of understanding anti-forensic approaches to effectively investigate cybercrimes and gather digital evidence.
Document Page
Running head: ANTI-FORENSIC
ANTI-FORENSIC
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1ANTI-FORENSIC
Description:-
This digital forensic can be a web processor analyzer's most terrible nightmare. Computer
operatives design anti-forensic machines to generate it long-lasting or unbearable to regain
evidence during an investigation (Fontani et al. 2014). This process signifies any method,
utilization, or software proposed to hamper a processor analysis. It is also possible to hide a
particular file inside another. Executable facts that processors classify as command base codes
which are most challenging.
The program based language termed packers can retreat executable details into other
modules of files, while devices called binders can fix various executable material together. Anti-
forensic device's approach and tactics are becoming demanding tricks for every forensic region.
With the presentation of anti-forensic techniques, it becomes exhausting to improve information
during a processor inquiry.
Critical Evaluation:-
The internet has a considerable number of anti-forensic approaches to obstruct the digital
movements of a singular (Liu 2017). Specific methods are usable, while some want to complete
methodological understanding. The enlightened techniques are calculatedly executed by the
black hat class to block a cyber-investigation. Anti-forensics methodologies are commonly
damaged into specific sub-categories to build the arrangement of the numerous methods and
tools simpler. Dr. Marcus Rogers has estimated various sub-categories like trail mystification,
data hiding, artifact wiping, and attacks besides the processor forensics actions and apparatuses
(Rochmadi, Riadi and Prayudi 2017). Occurrences against forensics devices flexibly have also
been titled counter-forensics. The perception of this approach is neither inventive nor flawless,
Document Page
2ANTI-FORENSIC
but in preceding times, forensic experts have observed a considerable uptick in the methods of
anti-forensics. The most open anti-forensic devices are also ubiquitous. Security software like
VPN or encryption support as details of the illegitimate hacker's work once he has entered a
system.
Anti-forensic devices frequently certify the user to hide evidence within places such as
memory, unknown partitions, and slack space. The standard corporate tools used is slacker, part
of the Metasploit framework. Slacker authorizes the operator to split a file into specific
categories, which are then dispersed over a structure slack space. The researchers are attempted
with different encounters every day as technology developments (DOrazio, Ariffin and Choo
2014). Understanding the actions digital investigations follow is perhaps one of the essential
features in learning anti-forensic approaches. Anti-forensics has been accepted as an unaffected
study field in recent times. Subsequently, it can be measured as a developing area of devotion,
and understanding is lacking in anti-forensics approaches.
Conclusion:-
These actions and tools have become an active part of the cybercrimes examination and
assembling digital facts in an instance. The forensic specialists generally monitor a usual
workflow and use well-known methodologies and tools while scrutinizing a circumstance. With
the support of the current OS, mostly by the Data management nature, actions, and indication, it
is easy to realize these individuals. On the contrary, due to diverse techniques applied by
computer users, it is hard to discover people who apply this type of forensic approach. The
effectiveness of these approaches to their users will also form the extent of this examination.
Problem-statement in modern times, there has been a severe development in the measure of anti-
forensic approaches used by offenders in unsatisfying exploratory procedures.
Document Page
3ANTI-FORENSIC
References:-
DOrazio, C., Ariffin, A. and Choo, K.K.R., 2014, January. iOS anti-forensics: How can we
securely conceal, delete and insert data?. In 2014 47th Hawaii International Conference on
System Sciences (pp. 4838-4847). IEEE.
Fontani, M., Bonchi, A., Piva, A. and Barni, M., 2014, February. Countering anti-forensics by
means of data fusion. In Media Watermarking, Security, and Forensics 2014 (Vol. 9028, p.
90280Z). International Society for Optics and Photonics.
Liu, Q., 2017. An approach to detecting JPEG down-recompression and seam carving forgery
under recompression anti-forensics. Pattern Recognition, 65, pp.35-46.
Rochmadi, T., Riadi, I. and Prayudi, Y., 2017. Live forensics for anti-forensics analysis on
private portable web browser. International Journal of Computer Applications, 164(8), pp.31-37.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]