top of page
BruCON-2022-102 (1).png

Anti-Forensics (and Anti-Anti-Forensics) Techniques for Incident Responders

2-day in-person

A full-spectrum dive into anti-forensics across Windows and Linux (with a tad of MacOS, if time permits), centered on real incidents and modern attacker behavior.

The course walks through classic log wiping, deeper filesystem tricks, PowerShell, timestomping, sandbox artifacts, memory-only execution, endpoint solution blind spots, and advanced Linux log manipulation.

Course Overview


A full-spectrum dive into anti-forensics across Windows and Linux (with a tad of MacOS, if time permits), centered on real incidents and modern attacker behavior.


The course walks through classic log wiping, deeper filesystem tricks, PowerShell, timestomping, sandbox artifacts, memory-only execution, endpoint solution blind spots, and advanced Linux log manipulation.


Each technique is paired with detection logic, weaknesses in attacker tradecraft, and practical forensic recovery paths. The material emphasizes hands-on analysis, including MFT/MSRUM/USN artifacts, ETW traces, VHDX extraction, /proc-based investigation, and highlights new research and tooling that shape current offensive and defensive strategies.


With many examples from real-world Incident Response cases, this course is an excellent addition to regular forensic classes.



Course outline

Part One - Windows

1. Introduction & Context

  • Origins of anti-forensics (THC 1995, NATO 2015)

  • How red/blue/purple perspectives frame the topic


2. Simple Anti-Forensics

  • Basic log-clearing techniques

  • Clearing MRU, TypedPaths, Recent Items

  • Event log wiping with wevtutil

  • What does “cover your tracks” actually mean


3. File Deletion & NTFS Internals

  • How deletion works on NTFS (MFT entries, slack)

  • File recovery from MFT / I30

  • sdelete, Cipher, wiping approaches

  • USN Journal fundamentals

  • Disabling or deleting USN records


4. Detection & Analyst Artifacts

  • MFT slack space

  • SRUM: usage insights, real-case examples

  • Limitations of selective SRUM manipulation

  • AppCmd misuse (attacker vs defender perspectives)


5. PowerShell Traces

  • PowerShell transcripts

  • ConsoleHost_history & PSReadLine

  • How attackers tamper with PSReadLine paths and styles

  • Limitations of Clear-History

  • Turla-style PowerShell ETW evasion attempts



6. Microsoft Defender (MP) Logs

  • Threat, engine, and scan artifacts

  • ClickFix campaign example



7. Timestomping in Depth

  • Tell-tale signs (and false assumptions)

  • touch.exe usage (UnxUtils)

  • File system tunneling

  • Velociraptor / KAPE analysis approaches

  • LNK-file metadata behavior


8. Additional Windows Artifacts

  • UAL (User Access Logging)

  • Windows Error Reporting (WER)

  • Bitmap Cache remnants from RDP

  • Firewall logs

  • PFRO.log behavior

  • Temporary event logs (Temp EVTX)

  • NTFS Operational logs

  • Shimcache, Clipboard, SearchService

  • Screenshots

  • Various other artifacts


9. Windows Sandbox & VHDX Forensics

  • How sandbox storage works

  • What artifacts persist

  • Extracting and analyzing differential disks


10. WSL & Service Abuse

  • WSL forensics and anti-forensics

  • Red-team service creation patterns and host cleanup issues


11. Exotic & Overlooked Artifacts

  • Palo Alto WildFire temp-file detections

  • Crash dump artifacts

  • Phant0m (Windows Event Log Killer) behavior

  • ETW provider disabling (Defender, PowerShell)

  • auditpol abuse patterns


Part Two - Linux

12. Linux Anti-Forensics

  • dmesg clearing pitfalls (journalctl -k)

  • Syslog wiping (bleach) and what remains

  • Journal manipulation and persistence

  • memfd_create & fileless execution

  • /proc as an investigation goldmine

  • DDExec

  • Bash history avoidance strategies

  • File Deletion & Recovery

  • /proc and Runtime Forensics


13. Advanced Loading & Evasion

  • Dynamic loader abuse

  • Memory-only execution flows

  • Reconstructing ELF binaries from mapped regions

  • Using eBFP to silence logging mechanisms

  • Introduction to Linux Rootkits


Part Three - BONUS (If time permits) - MacOS

  • Short detour in the wonderful world of MacOS forensics

  • macOS Security Artifacts


Target Audience


Incident responders and SOC Analysts who want to learn more about (obscure) forensic artifacts, to be a step ahead of the threat actors. Based on real-life experience, this course goes beyond a regular forensic class

Pre-requisites


  • Laptop(16Gb RAM or more) capable of running 2 VMs simultaneously (Windows 11 and Linux)

  • VM software (VMWare/VirtualBox/...)

  • Admin rights

  • 2 Lab Virtual Machines



We will send out detailed VM Lab machine instructions about 2 weeks before class. Your 2 Lab VMs must be setup prior to the start of class!

Trainer Bio


Stephan Berger has over a decade of experience in cybersecurity. Currently working at the Swiss-based company InfoGuard, Stephan investigates breaches and compromised networks as Head of Investigations for the Incident Response team. An avid Twitter user under the handle @malmoeb, he actively shares insights on cybersecurity trends and developments. Stephan also authors the blog DFIR.ch, where he provides in-depth analysis and commentary on digital forensics and incident response. Stephan has spoken at numerous conferences, sharing his expertise with audiences worldwide.


Twitter (X) : @malmoeb

LinkedIn : Link

bottom of page