2,4 General Advice for AF Techniques

Naturally, a forensic analyst will want to leverage automation to case his

workload and speed things up. There's an entire segment of the software

industry that caters to this need. By developing your own custom tools, you

effectively raise the bar by forcing the investigator to reverse your work, and

this can buy you enough time to put the investigator at a disadvantage.

Low and Slow Versus Scorched Earth

As stated earlier, the goal of AF is to buy time. There are different ways to

do this: noisy and quiet. I'll refer to the noisy way as scorched earth AF.

For instance, you could flood the system with malware or a few gigabytes of

legitimate drivers and applications so that an investigator might mistakenly

attribute the incident to something other than your rootkit. Another dirty trick

would be to sabotage the file system's internal data structures so that the

machine's disks can't be mounted or traversed postmortem.

The problem with scorched earth AF is that it alerts the investigator to the

fact that something is wrong. Although noisy tactics may buy you time, they

also raise a red flag. Recall that we're interested in the ease where an incident

hasn't yet been detected, and forensic analysis is being conducted preemp¬

tively to augment security.

We want to reinforce the impression that everything is operating normally.

We want lo rely on AF techniques that adhere to the low-and-slow modus

operandi. In other words, our rootkits should use only those AF tools that are

conducive to sustaining a minimal profile. Anything that has the potential to

make us conspicuous is to be avoided.

Shun Instance-Specific Attacks

Instance-specific attacks against known tools are discouraged. Recall that

we're assuming the worst-case scenario: You're facing off against a skilled

forensic investigator. These types aren't beholden to their toolset. Forget Nin¬

tendo forensics. The experts focus on methodology, not technology. They're

aware of:

the data that's available;

the various ways to access that data.

If you landmine one tool, they'll simply use something else (even if it means

going so far as to crank up a hex editor). Like it or not, eventually they'll get

at the data.

Parti I 49