ANTI-FORENSIC TOOLS

Kamis, 29 Mei 2014

This page has raised a few eyebrows in it's time because it details products that could thwart a forensic investigation. The information isn't provided to assist anyone in avoiding prosecution, but to help forensic tool developers build better products and to assist forensic investigators in understanding what they may be up against.  Before publishing this page advice was sought from the UK National High Tech Crime Unit (NHTCU), They felt that many of the rogues who may benefit from the products on this page were already aware of them.  We therefore see this page as no different than publishing vulnerabilities and exploits for applications and operating systems that are already on the street.

SRM
Visit the Product Site http://srm.sourceforge.net/
srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinking them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examina ...
Vendorelleron  Pricing Model GPL  Modified 2003-05-28

WIPE 
Visit the Product Site http://wipe.sourceforge.net/
ya-wipe is a tool that effectively degausses the surface of a hard disk, making it virtually impossible to retrieve the data that was stored on it. This tool is designed to make sure that sensitive data is completely erased from magnetic media.
Vendornester  Pricing Model GPL  Modified 2003-05-28

OVERWRITE 
Overwrite is a UNIX utility that try to make harder data recovering. What overwrite does is to overwrite files using random patterns and deterministic patterns, as suggested in the Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-Sta ...
VendorSalvatore Sanfilippo  Pricing Model GPL  Modified 2003-03-31

DBAN 
Visit the Product Site http://www.dban.org/
Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for ...
VendorDark Horn  Pricing Model Freeware  Modified 2009-02-19

DISKZAPPER 
Visit the Product Site http://diskzapper.com/
Diskzapper Dangerous automatically begins erasing all the disks as soon as the booting process is completed. No user action is required. This was intended to be used on computers for which it is not convenient to plug in a keyboard and monitor.
VendorPhil Howard.  Pricing Model COMMERCIAL  Modified 2003-05-28

BCWIPE 
Visit the Product Site http://www.jetico.com/
BCWipe can be run from My Computer as well as from a command-line prompt. BCWipe v.3 is a powerful set of utilities which complies with the US DoD 5200.28-STD standard and Peter Gutmann wiping scheme. You can also create and use you own customized wiping ...
VendorJetico  Pricing Model COMMERCIAL  Modified 2003-05-28

see more click here

MANY ASSORTED TOOLS
Visit the Product Site http://ntsecurity.nu/toolbox/
Includes file encryption tools that can encrypt with either 3-DES or IDEA.
VendorArne Vidstrom  Pricing ModelFreeware  Modified 2003-05-28

SECUREIT 
Secure IT 2000 is an easy to use, feature packed, file and folder encryption program based on 448-bit strong encryption using the Blowfish algorithm. It includes a customizable file shredder, and the ability to generate self decrypting email attachments.
VendorCypherix Encryption Software  Pricing Model Commercial  Modified 2009-02-25

CRYPTOMITE
CryptoMite enables you to encrypt, decrypt, and wipe files and folders of any type. It supports various encryption engines, along with ZIP compression. Functions to build self-extracting encrypted ZIP files and e-mail capabilities are also included.
VendorBAxBEx Software  Pricing Model COMMERCIAL  Modified 2003-05-28

EVIDENCE ELIMINATOR 
Evidence Eliminator destroys: Windows SWAP file, Windows Application logs, Windows Temporary Files, Windows Recycle Bin, Windows Registry Backups, Windows Clipboard Data, Start Menu Recent Documents history, Start Menu Run history, Start Menu Find Files ...
VendorRobin Hood Software Ltd.  Pricing Model COMMERCIAL  Modified 2003-05-28

TRACKS ERASER PRO 
Visit the Product Site http://www.acesoft.net/features.htm
Tracks Eraser Pro is designed to protect you by cleaning up all the tracks of Internet activities on your computer. With only one click, Tracks Eraser allows you to erase the cache, cookies, history, typed URLs, autocomplete memory, index.dat from your br ...
Vendor Naval Criminal Investigative Service (NCIS) Pricing Model COMMERCIAL  Modified 2003-05-28

DECLASFY 
The program is designed to "wipe" hard disks to meet Department of Defense standards from the Rainbow series concerning declassification (wiping) of hard disks and cleansing of floppy disks. Declasfy writes the entire disk with hex 0s, then 1s (0xff), the ...
Vendor Mares and Company, LLC  Pricing Model COMMERCIAL  Modified 2003-05-28

INVISIBLE SECRETS 
Visit the Product Site http://www.invisiblesecrets.com/
Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files ...
Vendor NeoByte Solutions  Pricing ModelCommercial  Modified 2010-12-16

BATCHPURIFIER
BatchPurifier is a tool to remove hidden data & metadata from multiple files. It is able to remove more than 50 types of hidden data from 20 file types, including Microsoft Office ...
Vendor Digital Confidence Ltd.  Pricing ModelCommercial  Modified 2010-08-18

MANTRA 
Visit the Product Site http://www.getmantra.com/
Mantra is a collection of free and open source tools integrated into a web browser, which can become handy for students, penetration testers, web application developers, security professionals etc. It is portable, ready-to-run, compact and follows the tru ...
Vendor Mantra hosted at SourceForge  Pricing Model Open Source  Modified 2011-11-19
TagsXSS, scanning, penetration testing, enumeration, exploitation


ATTENTION-DEFICIT-DISORDER (ADD) 
ADD is a physical memory anti-analysis tool designed to pollute memory with fake artifacts. This tool was first presented at Shmoocon 2014. Please note that this is a proof of concept tool. It forges OS objects in memory (poorly). It would be easy (very e 
Vendor Jake Williams  Pricing Model Open Source  Modified 2014-01-29

Menurut forensics Wiki "Anti-forensics tools" antara lain :

Pembahasan aktivitas Anti-Forensik lainnya di sini:
http://resources.infosecinstitute.com/anti-forensics-part-1/
http://resources.infosecinstitute.com/anti-forensics-2/

sumber:

---EOF

17 comments:

Anonim mengatakan...

Great post on many forensic tools, currently i am learning Cyber Security please let me know the good resources to start with.
Thanks in advance.

릴게임 mengatakan...

This is certainly the best article. Very well constructed about blog commenting. Blog commenting plays a good role in SEO infact approving the comments is biggest achievement.

퍼스트카지노 mengatakan...

I thought blog commenting was useless since Google only values dofollow links. After reading your post, however, it seems I am no longer so skeptical on this matter �� Many thanks,
https://vfv79.com/first/

바카라사이트 mengatakan...

Good Article, But now-a-days almost all the blogs moderate the comment before they approve so it’s tough to get a backlink. I will recommend if you focus more on building trust and then comment on it with a backlink. Otherwise blog comment is almost going to die in near future as people are more smart now

카지노사이트 mengatakan...

thanks for the info. I am personally very new to blogging so this helps me a lot

바카라사이트추천 mengatakan...

I’m a newbie in the blogging world and always find it difficult to have triffic but as soon as I finished reading this post, I would make sure I follow the instructions as given above. I would also love more to read more on this. Thanks

경마사이트 mengatakan...

Thank you the guidance of blog commenting. Commenting is something that should be genuinely spoken words.

더킹카지노 mengatakan...

Hello,the information you provided in this article is very useful.As a newbie, i learned a lot from your website shoutmeloud.The information you provided on this website is worth and very useful for the beginners.Thank you thank you very much.

샌즈카지노 mengatakan...

Ada juga permainan klasik craps, yang dipahami sebagian besar setiap orang yang menuju kasino. Di sisi lain, Anda akan menemukan beberapa permainan dadu lain yang tersedia untuk lantai kasino secara bersamaan juga. Kami juga memiliki permainan video roda roulette yang terkenal! Harap dicatat bahwa ada juga beberapa variasi meja permainan kasino yang sangat disukai ini juga.

카지노사이트 mengatakan...

The spread to Tibet despite the implementation of strict checks on travelers and closing of tourist sites will renew concerns about how easily the virus is transmitted, particularly when people are asymptomatic.
https://www.betting33.com

카지노사이트 mengatakan...

On Tuesday, Tibet announced the indefinite closure of all tourist attractions, state-run newspaper People’s Daily reported, citing the regional Communist Party committee.

https://www.dbk222.com

바카라사이트 mengatakan...

“We are proud to have grown the virus in such a short space of time,” Catton said, adding that they will “share this with international colleagues” to help with the developments of vaccines and medicines.
https://www.yeah77.com

카지노사이트 mengatakan...

The number of confirmed cases of the Wuhan coronavirus in China has now officially exceeded that of the severe acute respiratory syndrome (SARS) outbreak in 2002 and 2003.
https://www.zzy29.com

카지노사이트 mengatakan...

At least 5,974 cases of the coronavirus have been reported in mainland China to date, whereas there were 5,327 confirmed cases of SARS on August 16, 2003, the last time the Chinese health ministry reported such data.
https://www.spacasino.net

카지노사이트 mengatakan...

While the current coronavirus outbreak does not appear to be as deadly as SARS, it may be spreading more rapidly. That could be due to being more contagious, or the increased interconnectedness of both China and the world than in 2003.
https://www.woorigame7.com


카지노사이트 mengatakan...

With the number of confirmed cases increasing day by day, concern is growing over the global spread of the virus. Numerous countries, including the US, have stepped up airport screenings and warned their citizens not to travel to China. Some countries, including Indonesia and the Philippines, have restricted Chinese tourists.
https://www.woorisoit.com

Anonim mengatakan...

Hello,

I wanted to send an email about a possible tool to use for complete data erasure. WhiteCanyon is the maker of WipeDrive, SystemSaver, SecureClean and many other software suites for data erasure as well as protecting information from falling into the wrong hands during recycling and repurposing. Please direct follow up emails to Marketing@whitecanyon.com . Thank you for your time. Perhaps there is the possibility to write a new article about data destruction about our software.

Posting Komentar