Pengujian Dan Analisa Anti Komputer Forensik Menggunakan Shred Tool

Main Article Content

Budi Rahardjo I Putu Agus Eka Pratama


Computer forensics and anti computer forensics are two opposing fields. Computer forensics is done by a computer forensics expert in order to obtain accurate data and evidence of cyber crime cases for investigation, while the anti-computer forensics conducted by the attacker to remove traces at once difficult computer forensics expert in performing its duties. For the attacker, the selection of anti-computer forensics tool that default on the target machine, more effective and faster than installing it first on the victim machine. For this reason the author chose shred as anti computer forensics applications on GNU / Linux machine. If anti forensic work, forensic experts would be difficult to perform computer forensics to data as evidence of cyber crime. This paper describes the anti-forensics performed by the attacker to remote machines GNU / Linux for cyber crime cases in a computer network. Anti forensic performed using shred the syslog file to remove traces of the crime at the same time make it difficult for the forensic process by computer forensics expert. Tests performed on three pieces of computer-based GNU / Linux on System Signals Lab intranet ITB. Each act as the target machine (server), firewall machine, and the machine attacker. Doing the anti computer forensics and computer forensics at the server machine. The test results are recorded and analyzed in order to then be deduced.


Download data is not yet available.

Article Details

How to Cite
RAHARDJO, Budi; PRATAMA, I Putu Agus Eka. Pengujian Dan Analisa Anti Komputer Forensik Menggunakan Shred Tool. Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, [S.l.], p. 104-114, aug. 2016. ISSN 2541-5832. Available at: <>. Date accessed: 28 oct. 2020. doi:
Anti Forensik, Shred, GNU/Linux, Network


[1] B. Blunden, “Anti Forensic : The Rootkit Connection,” 2009.
[2] M. Perklin, “Anti Forensic And Anti Anti Forensic,” 2011.
[3] S. Garfinkel, “Anti-Forensics : Techniques, Detection and Countermeasures,” in 2nd International Conference on i-Warfare and Security, 2012.
[4] I. Sporea, “On the Availability of Anti-Forensic Tools for Smartphones,” International Journal of Security (IJS), vol. 6, no. 4, pp. 58-64, 2012.
[5] Pajek, P., “Computer Anti Forensics Methods And Their Impact On Computer Forensic Investigation,” University of East London, United Kingdom, 2009.
[6] J. Mrshl, “Anti Forensic Seek And Destroy,” Echo Community, 2010.
[7] C. S. J. Peron and M. Legary, “Digital Anti-Forensics : Emerging Trends in Data Transformation Techniques,” Seccuris Labs, 2011.
[8] J. Stuttgen, Anti Forensic Resilient Memory Acquisition. Elsevier Digital, 2013.
[9] C. Armstrong, “Modelling Forensic Evidence System Using Design Science,” Curtin University of Technology Bentley, WA, Australia., 2010.
[10] G. Cairns, “Systematic Literature Review Of The Evidence For Effective National Immunisation Schedule Promotional Communications,” ECDC Stock., 2012.
[11] B. Nguyen, “Linux Filesystem Hierarchy,” 2011.
[12] A. Mathur, M. Cao, S. Bhattacarrya, A. Dilger, A. Tomas, and L. Vivier, “The New Ext4 Filesystem : Current Status and Future Plan,” 2011.
[13 ]CERT, “Computer Forensics,” USA, 2011.
[14] Pseudoanonymous, “Network Hack Philosopy,” Kecoak Elektronik, 2010.
[15] J. Y. Jianxin, “Denial Of Service : Another Example,” 2011.
[16] S. Kapoor, “Session Hijacking : Exploiting TCP, UDP, and HTTP Sessions,” 2011.
[17] S. Ganggan, “The Review Of Man In The Middle Attack.”