Becoming Virtually Untraceable (Eps6.0_H4rdc0r3_St34lth.cfg)

H.L. Mencken quote
1986 Jeep CJ-7; image courtesy of Cars For Sale
IE 11 Common Vulnerabilities & Exposures; courtesy of the MITRE Corporation
PowerShell example of the “ipconfig /all” command
HideMyAss Virtual Private Network (VPN) service; image courtesy of HideMyAss.com
Windows Event Viewer Application Log example

Digital Forensics

Hex Editing; Image courtesy of SANS DFIR

Anti-Forensics Techniques & Countermeasures

Anti-Forensics Extended Taxonomy; M. Rogers & the 16th Annual USA Digital Forensics Research Conference

Data Hiding

Digital forensic investigator; image courtesy of Ali Hadi
List of Executable Packers; courtesy of Wikipedia

Artifact Wiping

Trail Obfuscation

Additional Privacy Resources

--

--

--

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

CVE: 2021–3311 October CMS Token Reactivation

{UPDATE} Mirages d'hiver Hack Free Resources Generator

HTTP/2 in Deno

AMA Legal 03.06.22

{UPDATE} Dog Puzzles Hack Free Resources Generator

Performance comparison for Secure Element of IoT

What happened to the World Wide Web?

SAFE PROTOCOL is now listed on HOTBIT

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

꧁𓊈𒆜🆉3🆁🅾🆃🆁🆄🆂🆃𒆜𓊉꧂

the salty chronicles of one bumbling infosec engineer’s lifelong quest to design less shitty privacy & security while trying his best not to blow up the planet

More from Medium

Becoming Virtually Untraceable- “eps10_F0rm4t C:\*.*_W!pE.py”

18.5 million websites are ready to hack their visitors

When thinking of phishing, you might think of ‘Winning the Nigeran lottery’ or ‘Paying a small…

Questioning the Wisdom of Equipping Adversaries with Free Offensive Security Tools