Techniques used by Cybercriminals to Conceal their Digital Footprint During Forensics and How to Defeat.
Prudence Chioma
CyberSecurity Professional || Digital Forensics || Cyber Threat Intelligence || CyberGirl Alumna || Medical Practitioner (B.MLS)
Anti-forensics is like a way to play hide and seek with computer investigators. Cybercriminals hide information in many clever ways. Cybercriminals can even change the name of a file to make it look like something else. For example, they might change a file's name from .jpg to .mp3 to trick people into thinking it's a music file. This makes it hard for investigators to find any clues sometimes.
Anti-forensic techniques are used to:
Techniques Include:
1. File Deletion
File deletion is a critical element in anti-forensics, especially within the Windows operating system. To understand the mechanics of file deletion in anti-forensics, it's essential to understand the roles of the FAT (File Allocation Table) and NTFS (New Technology File System) file systems, as well as the Recycle Bin, along with the specific tools used in this context.
FAT File System:
NTFS File System:
Recycle Bin:
1. Temporary Storage: Deleted files in Windows typically find their way into the Recycle Bin, allowing users to recover them conveniently.
2. Anti-Forensic Potential: The Recycle Bin can be harnessed for anti-forensic purposes. Cybercriminals might delete files, sending them to the Recycle Bin, and then empty the Recycle Bin to eliminate them.
3. File Recovery: However, files aren't immediately gone even after "emptying" the Recycle Bin. Their data persists on the disk until overwritten. This allows forensic investigators to potentially recover deleted files using tools such as Autopsy, EnCase, or Forensic Toolkit (FTK).
Anti-Forensic Implications:
In anti-forensics, cybercriminals may leverage the characteristics of the FAT and NTFS file systems and the Recycle Bin to conceal their activities. They sometimes intentionally delete incriminating files, thinking they're gone for good. Yet, traces of these files may linger on the disk.
Defending Against Anti-Forensic File Deletion:
Tool of Recovery and How to Use:
Recovering Deleted Files Using Recuva (for FAT and NTFS File Systems)
Step 1: Installation
Step 2: Scanning for Deleted Files
Step 3: Scanning Process
Step 4: File Recovery
Step 5: Choose a Recovery Location
Recovering Deleted Files Using TestDisk (for FAT and NTFS File Systems):
Step 1: Installation
Step 2: Launching TestDisk
Step 3: Analyzing the Disk
Step 4: File Selection
Step 5: Recovering Files
Recovering Deleted Files Using Autopsy (for NTFS File System):
Step 1: Installation
Download and install Autopsy on your computer.
Step 2: Creating a New Case
Step 3: Adding the Disk Image
Step 4: File Analysis
Step 5: Recovering Files
Recovering Deleted Files Using EnCase (for NTFS File System):
Step 1: Installation
Step 2: Creating a New Case
Launch EnCase and create a new case. Specify the case details and the location of the disk image.
Step 3: Adding the Disk Image
Step 4: File Recovery
领英推荐
Step 5: Recovering Files
These tools work by scanning the disk for remnants of deleted files and presenting them to the user for recovery. They are effective in recovering files that have been marked as deleted but not yet overwritten by new data. However, using them responsibly and legally is essential, respecting privacy and data protection laws.
2. Steganography: Hiding data in plain sight.
This crafty technique involves hiding data within other data, like concealing a message within an image. It's a sneaky way to share information without attracting attention.
How CyberCriminals use OpenStego to hide a file
Step 1: Selection of Cover File
Step 2: Embedding the Secret Data
Step 3: Encryption (Optional)
Step 4: Distribution
Detection and Uncovering Hidden Files
Investigators employ specialized tools and techniques to detect and reveal hidden information to counteract the deceptive tactics of cybercriminals using steganography. One such tool is OpenStego, an open-source steganography application that aids in detecting and extracting concealed data. Below are the steps on how to use OpenStego:
Using OpenStego for Detection and Extraction
Step 1: Installation
Step 2: Opening Files
Step 3: Password (Optional)
Step 4: Extraction
Step 5: Saving Extracted Data
Step 6: Data Analysis
Step 7: Reporting
3. Encryption in the Hands of Cybercriminals:
Cybercriminals often employ encryption to obfuscate their activities and protect sensitive information from forensic investigators. This technique involves converting plaintext data into unreadable ciphertext, rendering it indecipherable without the corresponding decryption key.
Countering Encryption with Password Cracking:
One effective method to defeat encryption is password cracking. Cybersecurity professionals use specialized tools to attempt various combinations of passwords until the correct one is found. Here's a basic step-by-step guide on using a password-cracking tool to brute force a PDF:
1. Choose a Password Cracking Tool:
2. Input the Encrypted File:
3. Select Attack Mode:
4. Run the Tool:
5. Review Results:
Rainbow Table Attack: An Alternative Approach:
Another method to counter encryption is the use of rainbow tables. These precomputed tables store hashes and their corresponding plaintext passwords, expediting the decryption process.
Rainbow Table Attack on a File:
1. Generate or Obtain Rainbow Tables:
2. Import Tables into a Tool:
3. Select Target File:
4. Initiate the Attack:
5. Retrieve Results:
Beyond encryption, cybercriminals employ various tactics such as program packing, overwriting data, and onion routing to conceal their tracks. Program packing involves compressing or encrypting malicious code to evade detection by security tools, while overwriting data aims to erase traces of illicit activities. Onion routing, on the other hand, leverages layers of encryption to anonymize internet traffic.?
Which one of this, have you come across?
Copywriter | Community Manager at Crypto Bootcamp Community | Blockchain and Crypto Enthusiast | product and brand advertising specialist | Medical Scientist
1 年Beautiful piece, are these recovery tools mobile compatible as well?
Digital Forensics investigator, IT Analyst and Fixed Asset Consultant
1 年It will be good if you read up dark web and been anonymous on web It will help you in your forensics investigation. Puting yourself in the post of a cyber criminal will make you understand where to dig in your investigation..