Hey Christopher,

Some research into that area has already been done. You can find some excellent information with some "signatures" of what commercial anti-forensic tools do to the filesystem. They are from the 2005 Digital Forensic Research Workshop (DFRWS) presented by Matthew Geiger.

http://www.dfrws.org/2005/proceedings/geiger_couterforensics.pdf

http://www.dfrws.org/2005/proceedings/geiger_counterforensics_slides.pdf

-jhs
--
-------------------------------
John H. Sawyer - GCFA GCIH GCFW
    UF IT Security Engineer
-------------------------------

Christopher Blume wrote:
This brings up an interesting point. If enough disk wiping programs have some sort of unique, or at least semi-rare signature, it might be handy to maintain a database of those applications, and their specific techniques -- simply for cross-referencing.

-Christopher Blume

Simson Garfinkel wrote:

For many companies, I can imagine that they would like to have a positive validation that a disk was wiped, rather than that it just happened to be blank.

Reply via email to