Category Archive: Antiforensics

Torrentz Shuts Down, Largest Torrent Meta-Search Engine Says Farewell

Torrentz.eu, one of the world’s largest torrent sites, has announced “farewell” to its millions of users. The meta-search engine, which hosted no torrents of its own but linked to other sites including The Pirate Bay, has decided to cease its operation. The surprise shutdown marks the end of an era. Full story here:https://torrentfreak.com/torrentz-shuts-down-largest-torrent-meta-search-engine-says-farewell-160805/

Permanent link to this article: http://www.darknessgate.com/2016/08/05/torrentz-shuts-down-largest-torrent-meta-search-engine-says-farewell/

SKTimeStamp

SKTimeStamp is a very simple shell extension which adds a new tab to the Windows Explorer properties dialog. On that new tab, you can change the file/folder date and time. http://stefanstools.sourceforge.net/SKTimeStamp.html

Permanent link to this article: http://www.darknessgate.com/2016/08/04/sktimestamp/

Timestomp

Timestomp allows you to delete or modify all four New Technology File System (NTFS) timestamp values: Modified, Accessed, Created and Entry Modified. http://www.jonrajewski.com/data/for270/timestomp.exe Tool offical website is currently offline: https://www.bishopfox.com/resources/tools/other-free-tools/mafia/

Permanent link to this article: http://www.darknessgate.com/2016/07/29/timestomp/

SteganRTP – RTP Covert Channel

Steganography tool which establishes a full-duplex steganographic data transfer protocol utilizing Real-time Transfer Protocol (RTP) packet payloads as the cover medium. The tool provides interactive chat, file transfer, and remote shell access. https://sourceforge.net/projects/steganrtp/  

Permanent link to this article: http://www.darknessgate.com/2016/07/29/steganrtp-rtp-covert-channel/

My First book is coming soon…!

In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/07/19/my-first-book-is-coming-soon/

Steghide UI

Steghide UI is a nifty GUI written by Drunken.Canadian for the console application steghide as the name suggests. It allows the user to everything steghide can but with a nice user friendly GUI. Now, steghide UI has a new options panel. Download Steghide UI

Permanent link to this article: http://www.darknessgate.com/2016/06/09/steghide-ui/

JPHIDE and JPSEEK

JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2016/06/08/jphide-and-jpseek/

OpenPuff

OpenPuff is a professional steganography tool, with unique features you won’t find among any otherfree or commercial software. OpenPuff is 100% free and suitable for highly sensitive data coverttransmission. Carrier chains: Data is split among many carriers. Only the correct carrier sequence enables unhiding. Moreover,up to 256Mb can be hidden, if you have enough carriers …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/06/07/openpuff/

Tails

Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. It is a complete operating system designed to be used from a DVD, …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/05/14/tails/

Wipe

Wipe is a secure file wiping utility. There are some low level issues that must be taken into consideration. One of these is that there must be some sort of write barrier between passes. Wipe uses fdatasync(2) (or fsync(2)) as a write barrier, or if fsync(2) isn’t available, the file is opened with the O_DSYNC …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/07/wipe-2/

srm – secure file deletion for posix systems

srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinking them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examination of the disk, although it’s unlikely that it can completely prevent that type …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2015/02/06/srm-secure-file-deletion-posix-systems/

Page 1 of 212