Anti-Forensics
Clear Browser Artifacts
Clear Command History
Clear Operating System Logs
Delete User Account
Disk Wiping
File Deletion
File Encryption
Hide Artifacts
Log Tampering
Modify Windows Registry
Physical Destruction of Storage Media
Physical Removal of Disk Storage
Steganography
System Shutdown
Timestomping
Tripwires
Uninstalling Software
Use of a Virtual Machine
- ID: AF012.003
- Created: 25th May 2024
- Updated: 14th June 2024
- Contributor: The ITM Team
Hidden File System
A subject may use their own abstracted file system, separate from the standard file system. In doing so, insiders can hide the presence of malicious components and file input/output from security tools.