New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer



Similar documents
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

The Windows File Articles -> Software Oct , 00:45 (UTC+0)

Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik

Outline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS

A Forensic Comparison of NTFS and FAT32 File Systems

Windows OS File Systems

Help System. Table of Contents

Operating Systems CS-384. File Systems. NTFS and FAT32. Submitted To: Dr. Chris Taylor. Submitted By: Aditya Sitani

11.7 THE WINDOWS 2000 FILE SYSTEM

NTFS Documentation. Richard Russon Yuval Fledel

FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter Dr. Barnicki January 28, 2000

Installing a Second Operating System

CHAPTER 17: File Management

Review NTFS Basics. Behzad Mahjour Shafiei, Farshid Iranmanesh, Fariborz Iranmanesh. Bardsir Branch, Islamic Azad University, Bardsir, Iran

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Copyright

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

Alternate Data Streams in Forensic Investigations of File Systems Backups

Can Computer Investigations Survive Windows XP?

UNDELETE Users Guide

REPORT DOCUMENTATION PAGE

Prof. Dr. Ing. Axel Hunger Dipl.-Ing. Bogdan Marin. Operation Systems and Computer Networks Betriebssysteme und Computer Netzwerke

Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS)

Incident Response and Computer Forensics

UNDELETE Users Guide

Chapter 12 File Management

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

MANAGING DISK STORAGE

Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers

StarWind iscsi SAN Software: Implementation of Enhanced Data Protection Using StarWind Continuous Data Protection

Digital forensic techniques for static analysis of NTFS images

David Cowen Matthew Seyer G-C Partners, LLC

RECOVERING FROM SHAMOON

Data Hiding Techniques

Chapter 12 File Management

Chapter 12 File Management. Roadmap

Using Microsoft Windows Encrypted File System (EFS)

FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres

3. USB FLASH DRIVE PREPARATION. Almost all current PC firmware permits booting from a USB drive, allowing the launch

Windows 7: Current Events in the World of Windows Forensics

HP ProtectTools Embedded Security Guide

Recover Data for Windows Software

Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)


Secure data storage. André Zúquete Security 1

Introduction to BitLocker FVE

MSc Computer Security and Forensics. Examinations for / Semester 1

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Recovery of deleted files on a TrueCrypt volume March 23, 2010 rationallyparanoid.com

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas

File System Management

Ans.: You can find your activation key for a Recover My Files by logging on to your account.

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

2.8.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 16

McAfee EETech for Mac 6.2 User Guide

Date: March Reference No. RTS-CB 018

BACKUP & RESTORE (FILE SYSTEM)

Acronis Disk Director 11 Home. User's Guide

Overview. Windows Alternate Data Streams How code and data can be hidden within files and directories

K-Backup: Automatic Network Backup solution

Contents. Getting Started...1. Managing Your Drives Backing Up & Restoring Folders Synchronizing Folders Managing Security...

4 II. Installation. 6 III. Interface specification Partition selection view Partition selection panel

EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE

Recover data from a defective Fujitsu desktop drive

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

25. DECUS München e.v. Symposium C02. EFS / Recovery

SQL Backup and Restore using CDP

User Guide. Version Number 2.0

File Systems for Flash Memories. Marcela Zuluaga Sebastian Isaza Dante Rodriguez

Maintaining a Microsoft Windows Server 2003 Environment

NovaBACKUP. User Manual. NovaStor / November 2011

Managing Applications, Services, Folders, and Libraries

File System Design and Implementation

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

Zmanda Cloud Backup Frequently Asked Questions

Fall. Forensic Examination of Encrypted Systems Matthew Postinger COSC 374

DOCUMENTATION SHADOWPROTECT - MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS

NSS Volume Data Recovery

Lecture 18: Reliable Storage

EnCase 7 - Basic + Intermediate Topics

Data Recovery Wizard

716 West Ave Austin, TX USA

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide

Carry it Easy. User Guide

Operating Systems Forensics

Innovative Secure Boot System (SBS) with a smartcard.

File Systems Management and Examples

EaseUS. EaseUS Data Recovery Wizard User guide

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

SecureVault Online Backup Service FAQ

Password Changer for DOS User Guide

Guide to Securing Microsoft Windows 2000 Encrypting File System

Hyperoo 2 User Guide. Hyperoo 2 User Guide

Backup Exec 2010: Archiving Options

COS 318: Operating Systems

Chapter 4. Operating Systems and File Management

NTFS Undelete User Manual

Transcription:

New Technologies File System (NTFS) Priscilla Oppenheimer

NTFS Default file system for Windows NT, 2000, XP, and Windows Server 2003 No published spec from Microsoft that describes the on-disk layout Good sources for NTFS information Linux NTFS Project www.ntfs.com

Microsoft NTFS Goals Provide a reliable, secure, scalable, and efficient file system Get a foothold in the lucrative business and corporate markets Some concepts borrowed from OS/2 High Performance File System (HPFS)

NTFS Features Logging Transaction-based File and folder permissions Disk quotas Reparse points (used to link files) Sparse file support Compression Encryption Alternate data streams

Sparse Files Clusters that contain all zeros aren t written to disk Analysis considerations A deleted sparse file is hard to recover If file system metadata is deleted or corrupted, a sparse file might not be recoverable

File Compression Data is broken into equal-sized compression units (e.g. 16 clusters) An attempt is made to compress each unit Parts of a file may be compressed while other parts aren t

File Compression Analysis Considerations A single file can use different compression methods (e.g. none, sparse, or variant of LZ77) Recovery tools need to support decompression A deleted compressed file is hard to recover If file system metadata is deleted or corrupted, a compressed file might not be recoverable

Encrypting File System (EFS) Uses both symmetric key encryption (DESX) and asymmetric key encryption (RSA) Generates a single file encryption key (FEK) and encrypts file with FEK using DESX Stores FEK with file

File Encryption Key Encryption FEK is encrypted with user s public key FEK is decrypted with user s private key If policy allows it, FEK is also encrypted with public key of recovery agent (and decrypted with private key of recovery agent)

File Encryption Source: NTFS.com

EFS Analysis Considerations By default a user s private key is stored in the Windows registry, encrypted with login password as key Login password is susceptible to brute force attack and private key might be compromised EFS creates a temporary file (EFS0.TMP) with plaintext data Marks it as deleted when finished but doesn t actually erase contents

Alternate Data Streams Data added to a file Introduced to support Macintosh files that have a data and resource fork Almost impossible to detect with normal file browsing techniques A favorite of hackers and criminals

Easy to Create an ADS Source: WindowSecurity.com

Start the Program

What Program Is Running?

NTFS Basic Concepts Everything is a file Files have attributes $SOME_UPPER_CASE_THING $FILE_NAME $STANDARD_INFORMATION $DATA (the actual content)

File System Metadata Files Files that store file system administrative data Note that they are files (unlike FAT which was a separate data structure) Name begins with $ and first letter is capitalized $MFT $LogFile

Master File Table Contains information about all files and directories Every file and directory has at least one entry in the table Each entry is simple 1 KB in size Entry header is first 42 bytes Remaining bytes store attributes

File System Metadata Files First 16 MFT Entries Are Reserved Entry 0 1 2 3 4 5 6 7 8 File Name $MFT $MFTMirr $LogFile $Volume $AttrDef / $Bitmap $Boot $BadClus Description Entry for MFT itself Backup of MFT Journal Volume label, etc. IDs for attributes Root directory Allocation status of clusters Boot sector Clusters with bad sectors

Resident and Non-Resident s A resident attribute stores its content in the MFT entry A non-resident attribute stores its content in external clusters Non resident attributes are stored in cluster runs The attribute header gives the starting cluster address and its run length

Non-Resident s $DATA attribute for files > 1 KB $DATA attribute for $Boot $DATA attribute for $MFTMirr $DATA attribute for $LogFile

A Step Backwards

Hard Disk Drives Review Factory low-level formatting defines tracks and sectors on a blank disk A track contains many sectors A sector is typically 512 bytes A sector is the minimum I/O unit

Clusters A cluster is a group of consecutive sectors A cluster is the minimum file allocation unit The number of sectors per cluster is a power of 2 The number is stored in the volume boot sector Typical values are 2 1 =2, 2 2 =4, 2 3 =8, 2 4 =16

Partitions The user creates partitions (logical drives or volumes) Each partition uses a file system FAT12, FAT16, FAT32, NTFS on Windows systems EXT2, EXT3, UFS1, UFS2 on Linux and UNIX systems

File Systems High-level formatting creates file system data structures Root directory Data that tracks which clusters are unused, allowing the OS to find available clusters quickly File Allocation Table (FAT) on older Windows systems $Bitmap file in the Master File Table (MFT) on newer Windows systems

DOS Disk Review Partition 1 Partition 2 Master Boot Record Including Partition Table & Signature

Partition Holds an NTFS File System Partition 1 Partition 2 NTFS File System

NTFS: Everything Is a File Partition 1 Partition 2 NTFS File System Volume Boot Sector More Files

NTFS Volume Boot Sector Partition 1 Partition 2 NTFS File System Volume Boot Sector More Files Jump to boot code OEM ID: NTFS Bytes per Sector Sectors Per Cluster Location of MFT Location of MFT Mirror Boot Code Signature (0xAA55)

A Freshly Formatted NTFS Volume Partition 1 Partition 2 NTFS File System Volume Boot Sector More Files Free Space MFT Free Space More Metadata Free Space Hidden Copy of Volume Boot Sector

Metadata in Center of Volume Partition 1 Partition 2 NTFS File System Volume Boot Sector More Files Free Space MFT Free Space More Metadata Free Space Hidden Copy of Volume Boot Sector $MFTMirr $DATA $LogFile $DATA

MFT Partition 1 Partition 2 NTFS File System Volume Boot Sector More Files Free Space MFT Free Space More Metadata Free Space Hidden Copy of Volume Boot Sector $MFT $MFTMirr $LogFile $Bitmap $Boot $BadClus

Partition 1 Partition 2 NTFS File System MFT s Volume Boot Sector More Files Free Space MFT Free Space More Metadata Free Space Hidden Copy of Volume Boot Sector MFT Entries

MFT Entry Partition 1 Partition 2 NTFS File System Volume Boot Sector More Files MFT Free Space More Metadata Files Free Space Hidden Copy of Volume Boot Sector MFT Entry Signature ( FILE ) Offset to Fixup Array # of Entries in Fixup Array Sequence Number Other Stuff Fixup Values

Creating an NTFS File Creating dir1\file1.txt 1. Read volume boot sector to locate MFT. 2. Read first entry in MFT to determine layout of MFT. 3. Allocate an MFT entry for the new file. 4. Initialize MFT entry with $STANDARD_INFORMATION, etc. 5. Check MFT $Bitmap to find free clusters, using best-fit algorithm. 6. Set corresponding $Bitmap bits to 1. 7. Write file content to clusters and update $DATA attribute with starting address of cluster run and run length. 8. Read root directory (MFT entry 5), traverse index, and find dir1. 9. Read $INDEX_ROOT attribute for dir1 and determine where file1.txt should go. 10. Create new index entry; resort index tree. 11. Enter steps in $LogFile (as each step is taken).

An NTFS File 0 $MFT $LogFile 1 2 $LogFile 5 6 \ $Bitmap Cluster Bitmap 11 \ Index dir 1 200 200 dir1 \ dir1 file1.txt 304 304 file1.txt file1.txt $DATA attribute Cluster 692 Cluster 693

NTFS File Deleted Data in blue boxes is unallocated 0 $MFT $LogFile 1 2 $LogFile 5 6 \ $Bitmap Cluster Bitmap 00 \ Index dir 1 200 200 dir1 \ dir1 file1.txt $DATA attribute 304 file1.txt Cluster 692 Cluster 693

Deleting an NTFS File Deleting dir1\file1.txt 1. Read volume boot sector to locate MFT. 2. Read first entry in MFT to determine layout of MFT. 3. Read root directory (MFT entry 5), traverse index, and find dir1. 4. Read $INDEX_ROOT for dir1 entry and find file1.txt entry. 5. Remove filename entry from index; move other entries over. 6. Set MFT $Bitmap entries to 0. 7. Enter steps in $LogFile (as each step is taken).