Week 9 - Anti-Forensics Flashcards

1
Q

What is Anti-Forensics?

A

The act of compromosing the availability or usefulness of evidence to the forensics process. This can be encryption, data hiding etc..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is emerging technologies?

A

New technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three general strategies of anti-forensics?

A

Attack on Data
Attack on Tools
Attack on the Analyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an Attack on Data?

A

When potenital evidence is deleted or tampered with to make it unitelligible or inadmissible in a court of law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an attack on Tools?

A

When weaknesses in current computer forensics tools are exploited to produce ‘bogus’ investigation results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an Attack on the Analyst?

A

When problems are creating for the examiner that inhibit the digital forensics process. E.g. generating a huge amount of information that the examiner has to sift through, or casting doubt on the validity of the analysis or the analyst.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TRUE OR FALSE: Analysts may require anonymity.

A

TRUE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some anti-forensics tactics?

A

Zero foot printing
Data obfuscation
Data hiding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Zero foot printing?

A

Attenpting to eliminate residual traces of evidence to prevent the analysis of it as evidence. This includes secure deletion of files using shredding or wiping processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Data obfuscation?

A

When the nature of data is hidden, e.g. encryption of files, has collisions, modifying metadata or log data, signature analysis attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Data hiding?

A

When evidence is hidden out of sight on a disk. This can include steganography, scattering, hiding in slace space, convert channels, or rootkits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What must the attacker know to do zero foot printing?

A

The need to know:

  • What interaction took place between the attacker and the system (Assuming the crime was a cyberattack)
  • What actions were logged and how (Local or network based, Login, etc.)
  • What the “system artifacts” are, i.e. traces that are voluntarily or involuntarily left on the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the main reason for modifying metadata in anti-forensics?

A

To change the timestamps of certain variables like time created, last modified and accessed. This obscures the actual times the file was interacted with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is shredding/wiping?

A

A process that completely and fully eliminates the data of a file so that it can no longer be accessed and is fully deleted from the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two approaches to detecting wiping/shredding operations?

A

Wipe-trace search

Data deletion ‘anomaly detection’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are four example of anti-forensic tools developed by Metasploit?

A

Timestomp
Slacker
SAM Juicer
Transmogrify

17
Q

TRUE OR FALSE: Timestamping for files and logs can be disabled.

A

TRUE, you can disable the recording of timestamps in windows.