Professional Documents
Culture Documents
Digital Forensics
Countering Anti-Forensic
E orts - Part 2
Wed, 09/16/2015 - 11:44am by Oleg Afonin, Danil Nikolaev and Yuri
Gubanov
https://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-2 1/11
8/6/2017 Countering Anti-Forensic Efforts - Part 2
https://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-2 2/11
8/6/2017 Countering Anti-Forensic Efforts - Part 2
https://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-2 3/11
8/6/2017 Countering Anti-Forensic Efforts - Part 2
Data Encryption
Full-disk encryption is sometimes used by criminals who want
to hide their data from investigators. If a reasonably long,
complex password is used to encrypt the volume (where
https://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-2 4/11
8/6/2017 Countering Anti-Forensic Efforts - Part 2
https://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-2 5/11
8/6/2017 Countering Anti-Forensic Efforts - Part 2
394853-139583-506726-395820-621405-354512-066290-
589293
https://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-2 6/11
8/6/2017 Countering Anti-Forensic Efforts - Part 2
encrypted attribute.
Conclusion
Many types of anti-forensic efforts can be countered with
advanced forensic methods. While in certain cases such as
with jumplists, thumbnails and Skype chatsync database
the use of dedicated forensic tools is not necessarily required,
manually searching the disk for all available traces can be a
time-consuming operation requiring a qualified expert to
spend hours on low-level analysis. The overwhelming diversity
of applications, file formats, web browsers, crypto containers,
and image and document formats means there can be a huge
number of places containing hidden evidence. Even the most
qualified investigator may not be able to discover every little
bit of information there is. Time constraints may not allow a
thorough analysis of all but the most important cases.
https://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-2 9/11
8/6/2017 Countering Anti-Forensic Efforts - Part 2
RELATED READS
Self-Destructing
SSD-Drive
Evidence in 2016
Belkasoft
Evidence Center
Integration of
Belkasoft
Evidence Center
and LACE
https://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-2 10/11
8/6/2017 Countering Anti-Forensic Efforts - Part 2
Sort by Best
Recommend Share
https://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-2 11/11