Computer forensics lecture 2
Tools for privacy
Tor-
already know it
Onion
ring
Bouncey
bouncey ip
Tails
Live
CD with some features of a forensic live CD
Leaves
no trace on computer, all communications go via encrypted paths
They
have faults:
e.g
Tor has exit nodes
tails
doesn’t encrypt by defauls
tails
doesn’t make passwords stronger
tor
doesn’t protect from man in the middle
True crypt
Robust
encryption system for disks or folders
Pretty
much unbreakable
Upon
finding a system with true crypt, open system menue and select permantly
decrypt system drive if going to bitlocker
Truecrypt
looks random but it is not so contents can be found
RAM
dump may also recover passwords and cached files stored
Private browser
Reduces
traces left on a computer
Does
not hide traffic
Virtual machines
Can
potentially destroy evidence easily
still traceable however (See later posts)
still traceable however (See later posts)
RIPA (2000)
Can
be prosecuted under this act for failing to provide a password
Suspect
has to prove it is forgotten!
Lab notes
Logbook- lab session 3
Tried command : Cat Caine.ISI.* > CAINE.ISO
Command used allowed me to write on to disk
Probably worth using man and making further notes on this
: wodim -v -padsize=63s -pad dev=/dev/sg2 caine8.0.iso
Played around with CAINE disk
Using programs such as photorec and autopsy
Comments
Post a Comment