Cyber Crime and Cyber Terrorism


Secure Digest Functions (MD4, MD5, etc.) Collision Generation



Download 5,67 Mb.
Pdf ko'rish
bet101/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   97   98   99   100   101   102   103   104   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

Secure Digest Functions (MD4, MD5, etc.) Collision Generation:
Someone 
can alter a file and then use Anti-Forensic software to make this file having 
the same MD4 or MD5 value like before the alteration, thus bypass a forensic 
integrity check.
• 
Digital Memory Anti-Forensics:
There are programs that are able to hide 
processes or other evidence from memory.
• 
Misleading Evidence:
Someone can leave evidence in such a way to mislead 
the forensic investigation.
• 
Packers/Binders:
Someone can use such a program in order to transform a file 
by changing its structure, thus it can bypass security mechanisms that searches 
for malicious behavior patterns inside files.
• 
Forensic Tools Vulnerabilities/Exploits:
There are already implementations 
available to show that some of the computer current Forensic Tools can be 
bypassed or exploited.
• 
Resource Waste:
To purposefully leave traces in a big network in order to make 
the forensic investigator waste valuable resources and time.
• 
Forensic Detection:
Someone can install a mechanism to be triggered after any 
computer forensic-related presence.
• 
Anonymous Actions:
It includes every action that can be done by a fake or 
unknown identity. The result from the investigator is to fail to trace back the 
malicious activities.
• 
Anti-Forensics In Flushable Devices:
Someone can take advantage of devices 
that can be flashed (like PCI cards or BIOS) and install malicious code inside 
them, thus they can remain unnoticed.
From a forensic scope, anonymity can be considered as a major anti-forensic approach. 
For example, below are top Free Anonymous Web Proxy Servers (
Mitchell, 2013
):
• Proxify: this web proxy support encryption via Secure socket Layer (SSL), 
HTTPS network protocols and hides IP address and cookies filtering cookies.
• Anonymouse: has been around for many years and supports Web, email and 
Usenet (news) proxies.
• Anonymizer: is the most known name in the anonymous web proxy services.
• Ninja Cloak: from their homepage you can insert the URL of the site to be 
visited. This web-based proxy uses CGI.
Today WiFi networks are used widely; therefore, it would make it very easy for 
malicious network users to hide their true identities by stepping randomly on these 
wireless networks in order to conduct their attacks.
While in theory the forensics investigator should monitor everything available 
around the suspect, in reality the post incident response could end up quite dramati-
cally. This could be due to: ignorance regarding the network activity logs, legal barri-
ers between the access point and the forensics acquisition, noncooperative ISPs, etc.



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   97   98   99   100   101   102   103   104   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish