1. Teknik Dasar
    1. Data Hiding (Menyembunyikan)
      1. Steganografi / Watermarking
        1. Audio Steganografi
        2. File Steganografi
        3. File system Steganografi
        4. Text Steganografi
        5. Video Steganografi
      2. Kriptografi / Enkripsi
        1. Enkripsi Aplikasi
        2. Enkripsi Penyimpanan Cloud
        3. Enkripsi Jaringan Internet
          1. Enkripsi IP Security
          2. Enkripsi SSL/TLS
          3. Enkripsi SSH
          4. Enkripsi Jaringan Wireless
        4. Enkripsi Database
        5. Enkripsi Email
        6. Enkripsi File
          1. Multi-user file
          2. Single-user file
        7. Enkripsi Folder
          1. Multi-user folder
          2. Single-user folder
        8. Enkripsi Library
        9. Enkripsi Perangkat Mobile
        10. Enkripsi Password
        11. Enkripsi Disk Portable
        12. Enkripsi Bahasa Pemrograman
        13. Enkripsi Stream
      3. Data Contraception
        1. DKOM : Dirext Kernel Object Manipulation
        2. Live Distribution
        3. Memory resident compiler / assembler (merakit)
        4. Aplikasi Portable
        5. Injeksi Library Jarak Jauh
        6. Proxy Syscall
      4. Manipulasi File System
        1. Penggunaan Aliran Data Alternatif
        2. Penyembunyian File Slack Space
      5. Manipulasi Hardisk
        1. DCO
        2. HPA
      6. Penyembunyian Berbasis Memory
        1. bad block
        2. Direktori Tersembunyi
        3. Partisi Tersembunyi
        4. Emulator Memory-sharing
        5. Partisi MBR yang tidak digunakan
      7. Penyembunyian Berbasis Jaringan
        1. Terminal Emulator
        2. Jalur VPN
    2. Artefact Wiping (Menghilangkan)
      1. Format
      2. Defrag
      3. Wiping
      4. Delete
      5. Shred
      6. Erase
      7. Restore to Fabric setting
      8. New Install OS
    3. Trail Obfuscation (Mengaburkan)
      1. VPN
      2. TOR : The Onion Router
      3. VM : Virtual Machine
      4. Fabrikasi Data
      5. Misinformasi Data
      6. Data Obscurity
      7. IP Spoofing
      8. Manipulasi Log
      9. Mac Spoofing
      10. Server Proxy
      11. Jaringan Perr-to-Peer
      12. Trojan
      13. Akun Palsu
    4. Attack Thd Forensics Tools
      1. Stack Overflow
      2. Peringatan ke tool yang digunakan
      3. Rekayasa Kembali
      4. Serangan pada software
      5. Serangan pada nilai hash
      6. Serangan pada partisi
      7. Pengepack program
    5. Data Forgery (Rekayasa)
      1. header file
      2. ekstensi file
      3. konten
    6. Physical Destruction
  2. Project Miss Leading
    1. Metasploit Anti-Forensic Investigation Arsenal (MAFIA)
      1. https://www.ethicalhacker.net/forums/topic/metasploit-anti-forensic-investigation-arsenal-mafia/
    2. The Indicators of Anti-Forensics (IoAF)
    3. Kriptografi
  3. Definisi
    1. attempts to negatively affect the existence, amount, and/or quality of evidence from a crime scene, or make the examination of evidence difficult or impossible to conduct.
    2. application of the scientific method to digital media in order to invalidate factual information for judicial review."
    3. anti forensics aims to make investigations on digital media more difficult and therefore, more expensive
  4. Anti-Anti Forensics
  5. Contoh Kasus yg terpublikasi
    1. Real Case
      1. Kriptografi: San Bernadino Iphone - Cellbrite
      2. German Terrorist - Stegano : http://edition.cnn.com/2012/04/30/world/al-qaeda-documents-future/index.html
      3. TOR and Onion Routing