Anti-Forensic-Techniques
Anti-Forensic-Techniques copied to clipboard
Anti-Forensic-Techniques
Checklist: Anti-Forensic Techniques for Windows and Linux
Windows Techniques
1. Metadata Manipulation
- Timestamp Alteration: Use
Timestompor custom tools to modify file creation, access, and modification times. - Log Editing: Manually or automatically edit event logs using
EvtxEditor similar tools. - File Renaming: Rename files to inconspicuous names or extensions.
2. Data Hiding
- Alternate Data Streams (ADS): Use
stream.exeto hide data in NTFS streams. - Slack Space Utilization: Hide data in file slack space using tools like
SlackCleaner. - File Attribute Manipulation: Change attributes (e.g., hidden, system) with
attribcommand.
3. Obfuscation
- Executable Packing: Use tools like UPX to pack or obfuscate binaries.
- Encryption: Encrypt sensitive files with tools like
BitLockeror third-party tools. - Registry Obfuscation: Store payloads or configuration in obscure registry keys.
4. Log and Artifact Clearing
- Event Logs: Use
wevtutilto clear event logs:wevtutil cl System - Prefetch Cleaning: Delete files in
C:\Windows\Prefetch. - Recycle Bin: Empty recycle bin contents.
5. Disk Manipulation
- Wiping Tools: Use
sdeleteor similar to securely delete files. - Volume Shadow Copy Deletion:
vssadmin delete shadows /all /quiet - Hibernation File Removal:
powercfg -h off
6. Memory and Process Manipulation
- Anti-Dumping: Use tools like
Pafishto detect and avoid memory dumps. - Process Hollowing: Replace the memory of a legitimate process with malicious code.
7. Network Obfuscation
- Proxy Usage: Route traffic through proxies or VPNs.
- Firewall Rules: Create rules to block forensic tools from connecting to critical resources.
- DNS Manipulation: Redirect traffic to fake or benign domains.
Linux Techniques
1. Metadata Manipulation
- Timestamp Alteration: Use
touchto modify file timestamps:touch -t 202401010101 targetfile - Inode Modification: Use tools like
debugfsto edit inode metadata.
2. Data Hiding
- Hidden Directories: Use
.prefix to create hidden directories. - Steganography: Hide data in images or other file formats using tools like
steghide. - Filesystem Obfuscation: Use obscure filesystems like EncFS or eCryptfs.
3. Obfuscation
- Binary Packing: Compress executables with
upx. - Custom Encoding: Encode scripts or binaries with
base64orshc.
4. Log and Artifact Clearing
- Log Deletion:
rm -rf /var/log/* - Command History Clearing:
history -c && rm ~/.bash_history - Temp File Cleanup:
rm -rf /tmp/*
5. Disk Manipulation
- Secure File Deletion: Use
shredorddfor secure deletion:shred -u targetfile - Partition Wiping:
dd if=/dev/zero of=/dev/sdX bs=1M
6. Memory and Process Manipulation
- Process Cloaking: Use
libprocesshiderto hide processes. - Kill Forensic Tools: Identify and terminate forensic processes with
pkill.
7. Network Obfuscation
- MAC Address Spoofing:
ifconfig eth0 hw ether XX:XX:XX:XX:XX:XX - VPN and Proxy Usage: Route traffic through
OpenVPNortor. - Log Tampering: Alter
/var/log/auth.logto obscure SSH or other access logs.