What is anti forensics in cyber security?

Anti-Forensics Techniques that Minimize Footprint

Anti-Forensics Techniques that Minimize Footprint

This article is based on Footprint and their Anti-Forensics Techniques like Memory injection and Syscall Proxying, Userland Execve Technique, Syscall proxying, Exploiting Forensics Tools Bugs,Detecting Forensic Tool Activities Memory injection and Syscall Proxying In the buffer over–flow exploit attack, the attackers use buffer overflows as entry to a remote system in order to inject and run code in the address space of a running program, thereby successfully altering the victim program’s behavior. Then, the attacker …

Anti-Forensics Techniques that Minimize Footprint Read More »

Anti-forensic-techniques

Variety of important anti-forensic techniques

Anti-forensic techniques are the act ions and anti-forensic techniques that hinder the forensic investigation method therefore on shield the attackers and perpetrators. These techniques act against the investigation technique like discover particle, collect particle, and analysis is of proof files and sidetrack the incident responders. Anti-forensic techniques that embody deletion and over writing processes, to boot facilitate to substantiate the confidentiality of knowledge by reducing the flexibility to browse it. Attackers use these techniques to …

Variety of important anti-forensic techniques Read More »