Anti-forensics and its Techniques

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:32 AM on 5/15/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

33 Terms

1
New cards

Which of the following is a set of techniques that attackers use to avert or sidetrack the forensics investigation process or increase its difficulty?

Anti-forensics

2
New cards

Identify the type of password that is a signature of the original password generated using a one-way algorithm such as MD5.

Password hashes

3
New cards

Ronan, a forensic investigator, was tasked with investigating a system based on NTFS. After thoroughly examining the system’s hard drive, he discovered that most files were recently deleted from the file system but were recoverable. Ronan employed an automated tool to recover the deleted files from the hard disk.

Identify the tool that Ronan used to recover the deleted files from the drive.

Autopsy

4
New cards

Sherin, a forensic investigator, is attempting to recover deleted files and data from a suspected system. To recover the deleted files and data, he used an automated tool that scans the system’s hard drive.

Which of the following tools was utilized by Sherin in the above scenario?

Autopsy

5
New cards

The older FAT file system, used across Windows 98 and earlier versions, stored the deleted files in

Drive:\RECYCLED

6
New cards

On Windows 2000, NT, and XP, recycle bin storage located in

Drive:\RECYCLER\<SID>

7
New cards

On Windows Vista and later versions, recycle bin storage located in

Drive:\$Recycle.Bin\<SID>

8
New cards

Williams, a forensic investigator, was tasked with analyzing an image file. In this process, he identified that the metadata of the image file was deleted; therefore, he could only recover the files using the file header signature, which is a constant numeric or text value.

Which of the following tools can help Williams identify and recover the files using the file header signatures?

Hex Editor Neo

9
New cards

Hendrix, a forensic investigator, was appointed to investigate cybercrime. As part of this investigation, he was examining a forensically cloned hard disk. Hendrix identified that most of the files on the hard disk were password protected. He employed a password cracking tool to read and recover the password-protected files.

Identify the tool that Hendrix used to recover the password-protected files.

Cain & Abel

10
New cards

Which of the following techniques uses a program that attempts every combination of characters until the correct password is discovered?

Brute-forcing attack

11
New cards

Steganography

the art of hiding data “behind” other data without the target’s knowledge, thereby hiding the existence of the message itself.

12
New cards

Artifact Wiping

involves various methods aimed at permanent deletion of particular files or entire file systems.

13
New cards

Trail Obfuscation

to confuse and mislead the forensics investigation process.

14
New cards

Password Protection

shields information, protects networks, applications, files, documents, etc. from unauthorized users.

15
New cards

Lennox, a security specialist, was attempting to recover the data from an encrypted drive of a compromised system. Lennox suspected that the system might contain potential evidence related to the attack. For this purpose, he employed a technique using which he tried every possible key to recover the data and files stored in the drive.

Identify the technique employed by Lennox to recover the encrypted drive.

Brute-force attack

16
New cards

Keylogger attack

a type of spyware that is used to capture the keystrokes.

17
New cards

Dictionary attack

a dictionary file is loaded into the cracking application that runs against user accounts. A dictionary is a text file that contains several dictionary words or predetermined character combinations. The program uses every word present in the dictionary to find the password. They are more useful than a brute-force attack. However, this attack does not work against a system that uses passphrases or passwords not contained within the dictionary used.

18
New cards

Cryptanalytic attack

is essentially a brute-force attack used to decrypt any encrypted data (which may be referred to as a cipher).

19
New cards

While verifying the file format of evidence files, Patrick, a forensic investigator, detected that the suspect had changed the file extensions of some files from .jpg to .dll. Patrick used an automated tool to verify the file formats.

Identify the tool employed by Patrick in the above scenario.

Hexinator

20
New cards

Identify the hidden file in Windows that is crucial for the recovery of data and contains various details of deleted files such as their original file names, original file sizes, date and time of deletion, unique identifying number, and the drive number in which the files were stored.

INFO2

21
New cards

Timestomp

one of the most widely used trail obfuscation tools that allow deletion or modification of timestamp-related information on files. Procedure to defeat this technique is covered in “Detecting Overwritten Data/Metadata” section.

22
New cards

SafeBack

have software drivers to write data to a tape backup system from a suspect drive through the standard PCI/SCSI

23
New cards

DriveSpace

A Microsoft disk compression tool which excludes slack disk space between the files

24
New cards

ophcrack

a Windows password-cracking tool that uses rainbow tables for cracking passwords. It comes with a graphical user interface (GUI) and runs on different OSs such as Windows, Linux/UNIX, etc.

25
New cards

/bin/rm/

In Linux, users can delete files using /bin/rm/ command, wherein the inode pointing to the file is deleted but the file remains on the disk. If a user removes a file that is being used by any running processes, the contents of the file would occupy a disk space that cannot be reclaimed by any other files or programs.

26
New cards

copy

If the metadata files related to the original files are not present in the folder, then the investigator can use ‘copy’ command to recover the deleted files ($R files)

27
New cards

dd

Raw format creates a bit-by-bit copy of the suspect drive. Images in this format are usually obtained by using the dd command.

28
New cards

net file

The net file command reflects names of all files that are open on the server and the number of file locks on each file, if any. This command can also close individually shared files and remove file locks.

29
New cards

Erick, a forensics expert, was tasked with investigating a compromised machine that had been involved in various online attacks. In this process, Erick identified a corrupted file in the system. He scanned the Recycle Bin folder for the metadata of that file, but it was deleted from that location. Subsequently, he used a command to recover the deleted file.

Identify the command that Erick used to recover the deleted file.

<copy $R

30
New cards

Identify the technique that includes the disintegration, incineration, pulverizing, shredding, and melting of digital media to make evidentiary data unavailable to forensics investigators.

Disk destruction

31
New cards

Which of the following is a process by which a strong magnetic field is applied to a storage device, resulting in a device devoid of any previously stored data?

Disk degaussing

32
New cards

To solve a case, Steve, a digital forensics investigator, was inspecting a disk from which the attacker wiped all the data using a technique that deletes only address tables and unlinks all the files in the file system. Steve used an automated tool to recover the erased data from the disk.

Identify the artifact wiping technique employed by the attacker in the above scenario.

Disk formatting

33
New cards

Jude, a forensic professional in an investigation department, was tasked with analyzing a suspected Windows machine. During the investigation, Jude found that some of the drive’s volumes were encrypted and needed to be decrypted for further investigation.

Which of the following tools can help Jude in decrypting the drive?

CrypTool