Title: Anti-Forensics
1Anti-Forensics
2Agenda
- What are anti-forensics?
- Who conducts anti-forensics, and why?
- How are anti-forensics developed?
- Where when are anti-forensics applied?
- Example 1
- Example 2
- Applications
3What are anti-forensics?
- Techniques to impair forensic analysis
- Reduce the amount of evidence
- Reduce the quality of evidence
4Who conducts anti-forensics?
- Criminals, to escape prosecution
- Liberals, to enforce privacy
- Conservatives, to conceal scandals
- Academics, to improve forensics
- Hackers, for fun profit
- Government, to protect classified information
- One mans freedom fighter
5How are anti-forensics developed?
- Identify assumptions
- Hardware (capabilities)
- Software (algorithms)
- People (procedures)
- Design an exploit
- Write an application
6Where are anti-forensics applied?
- File storage
- Hide or destroy data
- Obfuscate audit trail
- Networks
- Conceal source or destination of packets
- Hide content of transfer
- Hardware
- Degaussing
- Traps
7When are anti-forensics applied?
- Before data is created
- Prevention is the best medicine
- After data is created
- Routine use
- Emergency
8Example 1
9Example 2
10Applications
- File system
- Steganography
11Applications, file system
Slacker Slack space File growth
FragFS MFT Metadata growth
RuneFS Bad blocks Easy detection
WaffenFS Ext3 journal Consistency check
KY FS Null directory entries Validity check
Data Mule FS Inode reserved space Format check
StegFS Unused blocks New files
12Applications, steganography
TextHide Text in text Key exchange
Jphide/seek Text in Jpeg Stegdetect
MP3Stego Text in MP3 Steg Watch
StegoVideo Data in any codec None yet
Hydan Data in EXE Only subset of instructions can be used
13Applications, other
Timestomp create/modify/access/change None
Disk Utility 00s, FFs, random None
Nmap Decoy scan, FTP bounce Investigate each IP
StegTunnel TCP packets Dropped packets
Rexec Memory-only Live analysis
14Anti-Forensics