Anti- forensic techniques to attack gathers information that can be trace. Be erasi tampering with or hiding the Anti- forensic techniques seek vulnerabilities in the procedures and methods used as well as in forensic tools.
By exploiting these vulnerabilities, search delay or even derail an investigation, examination or incident response. It is one of more subjects treated in Computer Forensics, treated often in international and national conferences ( Black Hat, Defcon, H2HC, SegInfo ).
In addition to extensive research target, the Anti- forensic techniques are being detected with increasing frequency, from modern attacks with malicious code ( Stuxnet, Duqu ) to situations where the suspect himself may benefit by removing traces.
By Offensive Sec
0 comentários:
Post a Comment
Note: Only a member of this blog may post a comment.