Explore anti-forensics techniques and occult computing in this 59-minute conference talk by Adrian Crenshaw. Delve into topics such as private portable browsers, boot media, selective file wiping and encryption, defragmentation issues, USB device logs, and hibernation files. Learn about timestamp manipulation, shadow copy, booby-trapped devices, and cloud computing security. Discover various wiping tools, including Enhanced Secure Erase, and methods to change file hashes. Gain insights into disk structures, partitioning tricks, and unconventional data destruction methods like thermite use.
Anti-Forensics and Occult Computing Techniques - AIDE 2012