Awesome
Anti-Forensics
A Repository to Track Anti-Forensic Techniques
This list is built based on the response of the #DFIR community and the techniques we currently cover in our Anti-Forensics course.
Do you have any cool Anti-Forensic ideas to share? #DFIR #DigitalForensics
https://twitter.com/binaryz0ne/status/1618828773268520961
Data, Web, and Application Related
- File Formats Manupilation: -- PDF: modify the structure of the file to hide objects -- ZIP: modify the structure of the file to hide other data/files -- DOCX: extract and hide other content within the structure, all you need to do is change them to .xml -- RAR, 7zip: modify their structures to hold/hide other data -- etc
- Data Hiding
- Steganography -- LSB
- Encryption -- EFS, Bit Locker, GnuPG, AES -- TreuCrypt, VeraCrypt, etc -- Others "Encrypt all the things" @rwx_08, https://twitter.com/rwx_08/status/1618904019816292355
- "If you're using a web shell, disable IIS logging via appcmd" @keydet89, https://twitter.com/keydet89/status/1618952758287286273
Operating System, Virtualization, and Cloud Related
- GOD Mode
- Rootkits
- Deleted Registry Keys/Values and Shadow Copies
- Hiding Data in Windows Registry
- Portable VM
- "bring in your badness on a VM, delete it when you're done" @keydet89, https://twitter.com/keydet89/status/1618954586685075459
- "Timestomping Windows Registry Keys" @inversecos, https://twitter.com/inversecos/status/1618862849572605955
- "As you're leaving the system, clear ShimCache"
- "If you're in over RDP, disable tracking (JumpLists, etc.) for the user account" @keydet89, https://twitter.com/keydet89/status/1618952758287286273
- "I had my recent case where Dharma ransomware deletes the VSS and event logs thru a script called "purgememory.ps1" Pretty much the same as what this article mentioned" @r3nzsec, https://twitter.com/r3nzsec/status/1618862323221004289
- "#mobile -Use iCloud Photos -Sync data -Turn off iCloud photos -delete local files -daily use leave iCloud off -capture new media -turn on sync when needed/view sync data then turn back off and repeat If phy device is acquired examiner must dig for artifacts iCloud was used" @Scott_Kjr, https://twitter.com/Scott_Kjr/status/1619157873011085312
Logs Related
- Modify Linux and Apache Logs
- Timestomp Logs
- "Editing of existing EVTX entries" @inversecos, https://twitter.com/inversecos/status/1618862849572605955
- "You can EDIT existing entries inside EVTX files to change what the log entries say. Dont trust yo logs ;)" @inversecos, https://twitter.com/inversecos/status/1618863346991890433
- "Disable various WEVTX logs" @keydet89, https://twitter.com/keydet89/status/1618952758287286273
- "The Audit Log was Cleared: https://youtu.be/00EwvDKaKyQ One of my favorites" @Cyb3rSn0rlax, https://twitter.com/Cyb3rSn0rlax/status/1619002937296179200
File System Related
- NTFS File Tunneling
- Hiding Data in Slack Space (e.g. using Slacker)
- Hidden Volumes (WDM, Diskpart, TrueCrypt/VeraCrypt, etc)
- Alternate Data Streams (ADS)
- Timestomping Files
- Hiding Data in $EA Attributes
- File System Corruption: data destruction and wiping
- "time stomping FN attribute of the MFT (most analysts dont know this is even possible)"
- "tampering with $J to evade timestomp detection" @inversecos, https://twitter.com/inversecos/status/1618862849572605955
- "Depending on the system, disable USN change journal" @keydet89, https://twitter.com/keydet89/status/1618952758287286273
- "SSD information hiding, there is a way of hiding information in SSDs so it can't be read by the firmware and OS subsequently. I worked on that when I was a Master’s student a long time ago, it had great potential at the time." @ask_mecca, https://twitter.com/ask_mecca/status/1618886955395350528
Time Related (Wasting the analyst time by misleading them)
- "Give the analyst something to find so they stop looking - don’t let it get to tier 2+" @MattETurner, https://twitter.com/MattETurner/status/1618844853403799555
Videos
Good Anti-Forensics AF, https://www.youtube.com/watch?v=A4GYhGDCRSM
Great ideas
- "" The key thing to understand is this:
- You don't have to do anti-forensics in most cases; it's likely not necessary.
- Don't delete artifacts when you can configure the system so that they're never written."" @Keydet89, https://twitter.com/keydet89/status/1618954586685075459
More coming...