Avaliação de técnicas antiforenses computacionais aplicadas a registros de sistemas Linux
This work addresses anti-forensic techniques applied in log files. Log files are the main source of information for forensic experts and network administrators to investigate anomalies in computer systems, such as results from an invasion. The aim was to investigate anti-forensic techniques used in...
Autor principal: | Sá, Guilherme Zanini de |
---|---|
Formato: | Trabalho de Conclusão de Curso (Graduação) |
Idioma: | Português |
Publicado em: |
Universidade Tecnológica Federal do Paraná
2020
|
Assuntos: | |
Acesso em linha: |
http://repositorio.utfpr.edu.br/jspui/handle/1/6455 |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Resumo: |
This work addresses anti-forensic techniques applied in log files. Log files are the main source of information for forensic experts and network administrators to investigate anomalies in computer systems, such as results from an invasion. The aim was to investigate anti-forensic techniques used in log files and also evaluate the efficacy and difficulty of implementing such techniques. We used GNU / Debian Linux and we carried out two case studies: standard installation and safety measures. In both case, antiforenses techniques were evaluated regarding efficacy and difficulty. We assumed that the target system was already compromised. We verified that the techniques used as a super user are efficient in an environment without proper protection hence it becomes easy an invader hide his actions. |
---|