Detecting Linux Anti-Forensics: Timestomping
Descrição
#160; Threat actors can modify the timestamps on malicious files to evade detection. This technique has been used time and time again across va
![Detecting Linux Anti-Forensics: Timestomping](https://www.hackthebox.com/storage/blog/ecF2n1voeGMEQIsCxA1GrxecdOjFemxT.png)
5 anti-forensics techniques to trick investigators (+ examples
![Detecting Linux Anti-Forensics: Timestomping](https://i.ytimg.com/vi/OTea54BelTg/maxresdefault.jpg)
Windows MACB Timestamps (NTFS Forensics)
![Detecting Linux Anti-Forensics: Timestomping](https://miro.medium.com/v2/resize:fit:1400/1*9-GFZPxbUBQOzQ-48zzuVA.png)
Forensic detection of MITRE ATT&CK Techniques
![Detecting Linux Anti-Forensics: Timestomping](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiASJqCn5IWtzIqBro5Gg3Sx-VDCFTP8o7rIyZbYCHzsLoiZQccsXXTmoKoqUZS2NqVk9uD_N33puFdmrWbkJdLd7Vwx49wTFpvFYwdyTevmNZunKf7LX0WSiJmBN6_pJKsv5SwJPB9SUo9_E79kSG7IkJNoPHReXRqgq5-OwBSf_ISpyRa8cnAVuj1g/s712/9.png)
Detecting Linux Anti-Forensics: Timestomping
![Detecting Linux Anti-Forensics: Timestomping](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3A03MC4PfV8tlYCqUV5F3i54K3ikNVluUmy105BrmbwC3ynxU3_rm15cx5KXeM1nQIpGpCRKo4VYq_hR2XFR6l2NmV-78I_DENyzIt67lqgzSbFhJP4h1-wV7aX-1RbaRjhcSXd3RwU2tqO1Ub3bIPfJ4rMW8t1vCBDA1YwArnBNuMem8lvD7rmC5KQ/s1222/9.png)
Detecting Linux Anti-Forensics Log Tampering
![Detecting Linux Anti-Forensics: Timestomping](https://i1.rgstatic.net/publication/349312895_Detection_and_Mitigation_of_Anti-Forensics/links/602a5cdfa6fdcc37a8299139/largepreview.png)
PDF) Detection and Mitigation of Anti-Forensics
Lina L. en LinkedIn: Detecting Linux Anti-Forensics: Timestomping
Lina L. en LinkedIn: Detecting Linux Anti-Forensics: Timestomping
Anti-Forensic Techniques Used By Lazarus Group - ASEC BLOG
![Detecting Linux Anti-Forensics: Timestomping](https://1517081779-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-L_2uGJGU7AVNRcqRvEi%2F-MXn4LLk_SgzjpV5_ZXX%2F-MXnN_E6Br3OZHaIH7ry%2Fimage.png?alt=media&token=10186872-8de4-4461-9f0d-d2248d513818)
Anti-Forensic Techniques - HackTricks
de
por adulto (o preço varia de acordo com o tamanho do grupo)