Anti-computer Forensics - Trail Obfuscation

Trail Obfuscation

The purpose of trail obfuscation is to confuse, disorientate and divert the forensic examination process. Trail obfuscation covers a variety of techniques and tools that include “log cleaners, spoofing, misinformation, backbone hopping, zombied accounts, trojan commands.”

One of the more widely known trail obfuscation tools is Timestomp (part of the Metasploit Framework). Timestomp gives the user the ability to modify file metadata pertaining to access, creation and modification times/dates. By using programs such as Timestomp, a user can render any number of files useless in a legal setting by directly calling in to question the files' credibility.

Another well known trail-obfuscation program is Transmogrify (also part of the Metasploit Framework). In most file types the header of the file contains identifying information. A (.jpg) would have header information that identifies it as a (.jpg), a (.doc) would have information that identifies it as (.doc) and so on. Transmogrify allows the user to change the header information of a file, so a (.jpg) header could be changed to a (.doc) header. If a forensic examination program or operating system were to conduct a search for images on a machine, it would simply see a (.doc) file and skip over it.

Read more about this topic:  Anti-computer Forensics

Famous quotes containing the word trail:

    Most of us don’t have mothers who blazed a trail for us—at least, not all the way. Coming of age before or during the inception of the women’s movement, whether as working parents or homemakers, whether married or divorced, our mothers faced conundrums—what should they be? how should they act?—that became our uncertainties.
    Anne Roiphe (20th century)