Combating Anti-forensics: Timestomping
Timestomping When conducting a forensic investigation, it is crucial to understand the timeline of events that occurred on a system. An investigator can utilize timestamps to gather information about file creation dates, modification dates, access dates, and more. However, if someone wants to complicate an investigation, they could obscure the metadata of certain files to…
Combating Anti-forensics: Encryption
So much information can be gathered about someone through the data they leave behind on electronic devices they’ve used. But all of this information is useless if the investigator cannot get access to it. A common anti-forensics measure that many people use is encryption. If an investigator comes across a piece of evidence that is…
Combating Anti-forensics: Secure Deletion
Anti-forensics A lot of people aren’t fully aware of the trail they leave behind after using an electronic device. This makes a digital forensic investigation very useful when trying to piece together events that occurred. Some people, however, will try to use various techniques to cover their tracks. This practice is known as anti-forensics. If…
Is Private Browsing Truly Private?
Nearly every web browser has a built-in private browsing feature. During normal browsing, all of your web activity is stored locally on your machine, including website history, cookies, and cached data. Sometimes people don’t want to leave a log of their browsing history, so luckily all the most popular web browsers include a feature to…
Recovering Deleted Files After a Malware Attack
Data is everything. There are many threat actors out there who will try to steal or manipulate your data, but sometimes the worst thing that can happen is total obliteration of files that are important to you. Fortunately, all hope is not lost if you find yourself in a situation like this. This is a…
This Is How Your Data Can Be Stolen
In today’s digital era, people are constantly reminded of the importance of protecting your data. Data breaches happen on a regular basis, and anyone can fall victim to it. This is a practical demonstration of a basic way that data is stolen, and how to protect against it. For this project, I started up two…
Windows Password Cracking
While working on a project on one of my Windows 8.1 virtual machines, I accidentally locked myself out. I didn’t remember what the default password was, and although I’m sure I could look into the documentation for the iso to see what it was, I figured this would be a great opportunity to practice some…
