how do attackers use anti-forensic tools to misdirect an investigation

Anti-Forensics Countermeasures

Anti-Forensics Countermeasures

This article is based on Anti-Forensics Countermeasures & Anti-Forensics Challenges Anti-Forensics Tools: Privacy Eraser, Anti-Forensics Tools: Azazel Rootkit, Anti-Forensics Tools: QuickCrypto etc… Anti-Forensics Countermeasures Anti-Forensics Countermeasures this topic is explained in his article with the help of their tools like  Privacy Eraser, Azazel Rootkit, QuickCrypto etc. Investigators can overcome the anti-forensic techniques discussed in this module through improved monitoring of systems or by fixing bugs in the current generation of computer forensic tools. Replace weak …

Anti-Forensics Countermeasures Read More »

Anti-Forensics Techniques that Minimize Footprint

Anti-Forensics Techniques that Minimize Footprint

This article is based on Footprint and their Anti-Forensics Techniques like Memory injection and Syscall Proxying, Userland Execve Technique, Syscall proxying, Exploiting Forensics Tools Bugs,Detecting Forensic Tool Activities Memory injection and Syscall Proxying In the buffer over–flow exploit attack, the attackers use buffer overflows as entry to a remote system in order to inject and run code in the address space of a running program, thereby successfully altering the victim program’s behavior. Then, the attacker …

Anti-Forensics Techniques that Minimize Footprint Read More »