Skip to content

[FEATURE REQUEST] - System configuration for little Anti-Forensic techniques #8

@SegoCode

Description

@SegoCode

Feature Description

This proposal is designed to enhance privacy and security in Windows through the implementation of anti-forensic techniques. It involves disabling selected services and adjusting registry settings to minimize digital footprints and data collection. The specific changes include:

  1. Minimizing System Logging and Data Collection:

    • Volume Shadow Copy Service (vss): Disabled to prevent the creation of system restore points and shadow copies, which could be used for data recovery. Command: sc config vss start= disabled.
    • Windows Event Log Service (EventLog): Disabled to limit the logging of system events, reducing potential sources of forensic data. Command: sc config EventLog start= disabled.
    • Registry setting for EventLog: Ensures the service is disabled at the registry level for consistency. Command: reg add "HKLM\SYSTEM\CurrentControlSet\Services\EventLog" /v Start /t REG_DWORD /d 4 /f.
  2. Enhancing User Privacy and Reducing File System Traces:

    • UserAssist Tracking: Disabling registry keys that track program usage, preventing the accumulation of user activity logs.
      • Commands:
        • reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_TrackProgs /t REG_DWORD /d 0 /f
        • reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Start_TrackEnabled /t REG_DWORD /d 0 /f.
    • NTFS Last Access Update: Disabling this feature stops the logging of file access timestamps, further reducing data available for forensic analysis. Command: reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem" /v NtfsDisableLastAccessUpdate /t REG_DWORD /d 1 /f.

Motivation

This configuration targets users who are concerned with digital privacy and security, especially those seeking to safeguard their information from forensic analysis. By limiting system logging and data collection, it reduces the potential for unwanted data recovery and analysis.

Alternatives

  • Keeping the default configuration, which might allow for more extensive data collection and logging.
  • Using specialized anti-forensic software, which may not be as integrated with the system or as user-friendly.

Confirmation

  • I performed a search of the feature requests to avoid suggesting a duplicate feature
  • I understand that not filling out this template correctly may lead to the request being closed

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions