In this article Explain different types of Anti-Forensics Tools which are using in forensic investigation.
1. Steganography Studio
Source: http://stegstudio.sourceforge.net
Steganography Studio is an anti-forensic tool to analyze the key steganographic algorithms. This tool implements algorithms that are configurable with a variety of filters. It implements the image analysis algorithms for the detection of hidden information. The software is developed in Java, allowing use in multiple OSs.
2. CryptaPix
Source: http://www.briggsoft.com
CryptaPix is an anti-forensic tool, image file management, and encryption program for Windows. The tool organizes prints and secures the digital photos and downloaded image files. it secures the proprietary images from unauthorized access with 256 bit AES encryption or hides sensitive text, data, or other images into an image with the secure steganography feature.
3. GiliSoft File Lock Pro
Source: http://gilisoft.com
GiliSoft File Lock Pro is an anti-forensic tool and encrypts the files. You will never worry about data theft by malicious behavior and privacy leaks. The tool locks folders on an internal hard drive, flash drive, external U513 drive, thumb drive, memory card, pen drive, and network drive. It restricts access to files, folders, and drivers; encrypts files and folders; hides files and folders and drives to make them invisible; makes files, folders, and drives read only; or password protects files, folders, and drives.
4. wbStego
source: http://wbstego.wbailer.com
As an anti-forensic tool, wbStego is used to hide sensitive data in a carrier file so that nobody will be aware of the existing data when sending an encrypted file,
5. Data Stash
source: http://www.skyjuicesoftware.com
Data Stash is a steganographic security tool and used to hide the files. It allows the users to hide sensitive data files within other files using steganography.
Features:
- Hides files within files (Steganography)
- Receptacle file remains fully functional
- Supports file formats of mpg, .jpg, .mp3, .exe, .com, etc.
- Provides password protection using Blowfish encryption
Related Product : Computer Hacking Forensic Investigator | CHFI
6. OmniHide PRO
source: http://omnihide.com
OmniHide PRO is a steganographic security tool used to hide files. Any file can be hidden within common image/music/video/document formats. The output file would work just as the original source file would.
Features:
- Hides files within photos, movies, documents, music, etc.
- No restrictions on input file types or size
- Enhanced security with password enabled encryption
- Free access to all future updates and patches
7. Masker
Source: http://www.softpuls.com
Masker is a steganographic security tool that encrypts files so that a password will be needed to open the files. It hides the files and folders inside carrier files, such as image files, video, program, or sound files. It allows to hide any files, even whole folders and sub-folders. The carrier file will remain fully functional. It allows transferring the carrier file through the Internet, and the hidden files inside will be transferred simultaneously with the carrier file, as they are a part of the carrier file.
Features:
- Hides files, folders, and sub-folders within a carrier file and vice-versa
- Supports multiple hideouts
- Previews function (hidden files can be previewed and modified in hidden mode)
- Searches function
8. Deep Sound
Source: http://jpinsoft.net
DeepSound is a steganographic security tool and audio converter that hides secret data into audio files. This application enables its users to extract secret files directly from audio files or audio CD tracks. DeepSound might be used as copyright-marking software for wave, flac, wma, ape, and audio D. DeepSound supports encrypting secret files.
9. DBAN
Source: http://www.dban.org
DBAN, an erasure software, automatically deletes the contents of any hard disk that it can detect. This method prevents identity theft before recycling a computer. DBAN is also a commonly used solution to remove viruses and spyware from Microsoft Windows installations.
10. Universal Shield
Source: http://www.everstrike.com
Universal Shield by Everstrike Software is the ultimate protection tool for one’s computer. It enables users to hide files, folders, and drives. It sets access rules using flexible security combinations for user’s most precious data. Universal Shield supports Windows 7/Vista/ XP/2003/2000 OSs.
Also Read : Anti-Forensics Countermeasures
Anti-Forensics Tools (Cont’d)
1. Ontrack Eraser Degausser
Source: http://www.krollontrack.co.uk
Ontrack DataAdvisor is a steganographic security tool. It provides security for backup systems and offers an online catalog view for the legacy tape libraries.
- Restores and migrates granularly specific items from specific tapes
- Deletes data securely with a certificate of erasure for each tape confirming the validity of the process
2. BatchPurifier
Source: http://www.digitalconfidence.com
BatchPurifier is the ideal tool to remove hidden data and metadata from multiple files.
Hidden data stored in many popular file types may contain confidential and private information that when exposed can cause you and your organization embarrassment with possible financial and legal implications.
BatchPurifier removes more than 50 types of hidden data from 25 file types, including Microsoft Offices documents (Word, Excel, PowerPoint)*, OpenOffice’ documents, PDF documents, and popular image and media file types such as JPEG,JPEG 2000, PNG, SVG, AVI, WAV,AIFF, MP3, MP4, and F4V. BatchPurifier™ can remove hidden data from files even if they are compressed within ZIP files.
3. Steganos Privacy Suite 17
Source: https://www.steganos.com
The Steganos Privacy Suite 17 is a steganographic security tool. It provides passwords for all online accounts that are automatically created, managed, and registered, regardless of whether the device is a computer, tablet, or a smartphone.
Features:
- Protects your privacy online: stops tracking anonymous browser and blocks ads
- Accesses your passwords without using a cloud possible
- Accesses your passwords via OneDrive and Google Drive
- Safer and regular reminder of password change
- Even easier mobile access with support for Touch ID on iOS
- The Internet Trace Destructor with support for Chrome, Firefox, and Internet Explorer—erases data tracks and stops the acquisitiveness of the computer
4. Webroot’s Internet Security Complete.
Source: http://www.webroot.com
Webroot Internet Security Complete 2017 provides real-time protection for PC’s and Mac’s. The tool protects against viruses, malware, phishing attacks and identity theft.
5. Blancco Flash
Source: http://www.blancco.com
Blancco Flash is a toot to permanently erase flash memory from USB drives, SD cards, micro drives, CompactFlash cards, and other flash memory storage devices, It reduces the risk of data loss and fraud by performing due diligence into best security practices.
Features:
- Permanently erase multiple flash drives, rapidly and simultaneously
- integrate seamlessly with Blancco Mobile to maximize erasure processes and impact across mobile devices and external SD cards
6. Blancco 5
Source: http://www.blancco.com
Blancco Flash is a tool to erase data from drives, including complex SSDs in desktop/laptop computers, servers, and storage environments with the most certified and patented data erasure solution. Blancco 5 is acknowledged by DIPCOG for being suitable for erasure of SSD media. Manage your data erasure on IT assets quickly and simultaneously to streamline your data management process.
Features:
- Permanently and verifiably erases data from SSDs to improve functionality of devices
- increases resale value of devices
7. Secure IT
Source: http://www.cypherix.com
Secure IT protects files individually through file encryption. It facilitates a customizable file shredder and the ability to generate self-decrypting email attachments, thereby allowing the user to send encrypted emails.
Features:
- High compression
- Command line processing
- Built-in file shredder
- Secure emails
8. Paretologic Privacy Controls
ParetoLogic Privacy Controls is a tool that allows the users to delete all the data related to Internet activity. The tool erases all privacy files pertaining to Instant Messaging and Voice Over Internet Protocol such as AOL, ICQ, MSNI, Yahoo! Instant Messenger, Google Talk, Skype, and Windows Live Messenger.
Features:
- Obliterates files from streaming video and those related to media players, including: iTunes, Windows Media Player, Winamp VLC, RealPlayer, DivX, and QuickTime
- Finds and deletes unwanted history items from third-party applications such as Adobe Acrobat and Macromedia Flash Player
- Removes all traces of your desktop search history from applications such as: Google Desktop Search, Yahoo! Desktop Search, and AOL Desktop Search
- Cleans information from Google Toolbar, Yahoo! Toolbar, AOL Toolbar, and eBay Toolbar
9. Exiv2
Source: http://www.exiv2.org
Exiv2 is a C++ library and a command line utility to manage image metadata. It provides read and write access to the EXIF, IPTC and XMP metadata of digital images in various formats.
Features:
- Converts EXIF and IPTC metadata to XMP and vice versa
- Supports EXIF Makernote
- Sets and deletes methods for EXIF thumbnails
- Extracts previews from RAW images and thumbnails from the EXIF metadata
- Inserts and deletes the thumbnail image embedded in the EXIF rnetadata
- Prints, sets, and deletes the JPEG comment of JPEG images
- Fixes the EXIF ISO settings of picture taken with Canon and Nikon cameras
10. Invisible Secrets 4
Source: http://www.invisiblesecrets.com
Invisible Secrets 4 is a tool to encrypt data and files for safe keeping or for secure transfer across the Internet, The tool hides files in places that on the surface appear totally innocent, such as picture or sound fires or web pages. It allows file encryption to hide files from Windows Explorer and transfers them by email or via Internet.
Questions related to this topic
- What are the three best forensic tools?
- What is anti forensics in cyber security?
- What are the forensic tools?
- What forensic tools are acceptable in court?
This Blog Article is posted by
Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092
Contact us – www.info-savvy.com