CFC Week 8: Anti-forensics
Learning outcomes
- Describe the most relevant anti-forensic techniques.
- Explain the challenges behind handling encrypted devices.
What is Anti-forensics’ goal?
It aims to evade and thwart the forensic process through the implementation of attacks and adoption of adversarial actions.
What are four most adversarial actions adoptted in Anti-forensics
-
Destroy : destroy potentially useful digital forensic evidence of their activities (like wiping log files)
-
Divert by : Plant misleading digital forensic evidence
- spoofing the source IP address of a cyber attack
-
Deceive by : hide potentially useful digital forensic evidence, use
- steganography
- onion-routing
-
Deny : Deny the access of potentially useful digital forensic evidence
- use cryptography and conceal the evidence
What is meant by Full disk encryption?
Secure the disk and other volumes with strong encryption key (2048 bits by TrueCrypt
)
How may a digital forensic examiner attempt to overcome FDE (full disk encryption) in a reasonably short time?
- In order to operate full disk encryption, the decryption key must be stored in main memory or in a separate device.
- Use live forensic techniques to retrieve the decryption key to decrypt the disks.
- FDE is not in operation:
- key might stored in a TPM (trusted platform module), a hidden partition or a dongle
- use
cold boot attack
which freeze the RAM to get stored encryption keys
How to make a sound forensic analysis (soundness)?
- Acquisition of data should change the regional evidence as little as possible
- changes needed to be explained and documented
- Documentation
- where the evidence originated?
- how it was handled?
When credentials for decrpyting are not available, what we can do with Full-disk encryption system?
- Attempt decryption
- brute force attack
- dictionary attack
- Load duplicate into a virtual environment
- decrypted later in a number of ways
- Restore to a working hard disk
- Boot a restored clone of the original disk
How to avoid an online suspect who is also technically sophisticated to tamper or erase the digital evidence?
- Distraction
- Hoax parcel delivery
- Meter reader
- kiss-o-gram
- Disablement
- disconnect electrical power supply
- pipe CS gas
- use a taser
Reverse engineering
aims to understand both:
- how malware technically behaves and
- how opaque system function prior to a forensic investigation