Overview. Windows Alternate Data Streams How code and data can be hidden within files and directories



Similar documents
New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

Alternate Data Streams in Forensic Investigations of File Systems Backups

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

Computer Security: Principles and Practice

BMC Performance Manager Windows Security White Paper DCOM / WMI

Accessing the SUNYIT wireless network for the first time

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

Digital forensic techniques for static analysis of NTFS images

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Data Igloo User Guide

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Windows OS File Systems

EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N REV A02

1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer

Data Stored on a Windows Computer Connected to a Network

Microsoft" Windows8 Home Server

Ans.: You can find your activation key for a Recover My Files by logging on to your account.

Charter Business Desktop Security Administrator's Guide

The Windows File Articles -> Software Oct , 00:45 (UTC+0)

System Management. What are my options for deploying System Management on remote computers?

Table of Content. Official website:

Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik

Outline. Windows NT File System. Hardware Basics. Win2K File System Formats. NTFS Cluster Sizes NTFS

Defense Security Service Office of the Designated Approving Authority Standardization of Baseline Technical Security Configurations

Data Stored on a Windows Server Connected to a Network

Events Forensic Tools for Microsoft Windows

Samsung Drive Manager FAQ

Refer to the Troubleshooting section first if you experience a problem with the product.

Quality of Service (bandwidth limitation): Default is 2 megabits per second.

Linux Server Backup Advanced Getting Started Guide

Upgrading Client Security and Policy Manager in 4 easy steps

TaxonHub Client. What is Taxon? TaxonHub Client. The Open Source project. suggest-term. admin. Strategy for version numbers

SecureVault Online Backup Service FAQ

Online Backup - Installation and Setup

Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition Administrator's Guide

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

Network Setup Instructions

Managing and Supporting Windows XP Chapter #16

Configuring and Administering Windows 7

Introduction to BitLocker FVE

Windows 7, Enterprise Desktop Support Technician

Acronis Backup & Recovery 10 Server for Windows. Workstation. Quick Start Guide

NTFS Documentation. Richard Russon Yuval Fledel

Course 50322B: Configuring and Administering Windows 7

ST0-141 Q&A. DEMO Version

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

DocuShare User Guide

Kaspersky Internet Security

Linux Server Backup Enterprise Getting Started Guide


LESSON 4 - FILE MANAGEMENT

SHAREENUM: WE WRAPPED SAMBA SO YOU DON T HAVE TO

How To Encrypt A Computer With A Password Protected Encryption Software On A Microsoft Gbk (Windows) On A Pc Or Macintosh (Windows Xp) On An Uniden (Windows 7) On Pc Or Ipa (Windows 8) On

Operating Systems Forensics

RSS Cloud Solution COMMON QUESTIONS

Windows Offline Files

Gold Lock Desktop. User Manual. Follow these simple steps to install, configure, and use Gold Lock Desktop.

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Pearl Echo Installation Checklist

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE

Windows Operating Systems. Basic Security

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

1 Preventing Devices from Connecting to Unsecure Wireless Networks

R4: Configuring Windows Server 2008 Network Infrastructure

New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support...

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana USA

Windows" 7 Desktop Support

Active Data Recovery Software. User Guide. Version Number 2.1

SecureVault Online Backup Service Client Installation Guide

Detection of Data Hiding in Computer Forensics. About Your Presenter

AccuGuard Desktop and AccuGuard Server User Guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Nimble Storage Best Practices for Microsoft Windows File Sharing

IFSM 310 Software and Hardware Concepts. A+ OS Domain 2.0. A+ Demo. Installing Windows XP. Installation, Configuration, and Upgrading.

Acronis Backup & Recovery: Events in Application Event Log of Windows

ilaw Installation Procedure

Chapter 7A. Functions of Operating Systems. Types of Operating Systems. Operating System Basics

Chapter 4. Operating Systems and File Management

How To Run Paragon Boot Camp Backup On A Mac Computer (Windows) On A Pc Or Mac (Windows 2) On An Ntos 2 (Windows 3) On Your Computer Or Ipad (Windows 1) On Pc Or Ipa

Managing and Maintaining a Windows Server 2003 Network Environment

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

74% 96 Action Items. Compliance

Introduction to Computer Security

70-685: Enterprise Desktop Support Technician

DriveLock and Windows 7

DISK DEFRAG Professional

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Agnitum SMB Solutions. Outpost Network Security Version 3.2 Securing your network

Transcription:

Overview Introduction Importance Origin NTFS Stream Basics Usages Demo Issues API Tools

Introduction A file is more than one file A file can act as container for other files One visible None or several invisibles Any kind of content of any size A file is basically the first stream of a file

Importance ADS is part of the NTFS infrastructure Is a mechanism that cannot be disabled ADS can contain data Content must be taken into account by backup ADS can contain code Existence must be taken into account by antivirus Potential danger (WNT.Stream virus) ADS are almost unknown ADS are almost invisible

Origin ADS exist since the inception of Windows NT 3.1, enabling Windows and Macintosh clients to share files. Data (content) and resource (management) forks Windows servers host resources through the FSFM service.

NTFS Basics - MFT Information about files on a NTFS partition is located in a construct called the Master File Table One record hosts a collection of attributes that document a file

NTFS Basics - Streams A File is a collection of attributes All are stored as (logically) separated streams Some are mandatory (name, time stamps ) Some are optional (security descriptor) Some may appear more than once (LFN/8.3, data ) Standard info LFN 8.3 Security Data Code Code Encryption

NTFS Basics File Content The content of a file is one stream among others Strictly speaking, NTFS doesn't manage files, it manages streams $STANDARD_INFORMATION General attributes (read-only, archive, time stamps, file creation, last modified). $FILE_NAME A file can have two filename attributes when a file with a long name has an automatically generated "8.3 name. $SECURITY_DESCRIPTOR Access Control List (DACL), Audit Control List and Integrity Level (SACL). $DATA Files have one default (unnamed/anonymous) data attribute (content of a file) and can have several (named) data attributes. Directories have one (default/unnamed/anonymous) data attribute (content of a directory) and can have several (named) data attributes.

Properties Streams share many properties

Windows usage Windows Explorer Zone Model The trust level of some downloaded files is stored inside a text file saved as an ADS and named Zone.Identifier [ZoneTransfer] ZoneId=3

Windows usage Icons for Favorites are saved in an ADS of the URL files

Windows usage Changes of entries in the Journal File are store in an ADS named $J \$Extend\$UsnJrnl $STANDARD_INFORMATION (resident) $FILE_NAME (resident) $DATA $J (nonresident) logical sectors 23039352-23090447 (0x15f8d78-0x160550f) logical sectors 26399296-26400295 (0x192d240-0x192d627) logical sectors 60720016-60728719 (0x39e8390-0x39ea58f) logical sectors 184110184-184110951 (0xaf94c68-0xaf94f67) logical sectors 60967328-60968351 (0x3a249a0-0x3a24d9f) logical sectors 58715456-58716479 (0x37fed40-0x37ff13f) logical sectors 58572096-58580287 (0x37dbd40-0x37ddd3f) $DATA $Max (resident)

Windows XP usage XP generalizes the Office Summary to all files Office Summary are stored in OLE streams Others Summary are stored in ADS streams DocumentSummaryInformation SebiesnrMkudrfcoIaamtykdDa SummaryInformation

Windows 2000 usage Thumbnails Explorer View encryptable ADS is added to the Thumbs.db files Indexing Service Q30lsldxJoudresxAssqpcawXc" ADS stream is added to image files

Demo Syntax Create an ADS into a file Create an ADS into a directory Open a file located in an ADS Run a program located in an ADS

API Documented CreateFile, ReadFile and WriteFile BackupRead, BackupSeek and BackupWrite Starting with W2K3 FindFirstStream FindNextStream IZoneIdentifier COM interface Undocumented NtQueryInformationFile

Management Tools No real Windows built-in tool Nfi Windows Resource Kit File Monitor - www.sysinternals.com Streams www.sysinternals.com Sfind www.foundstone.com CmdStream/ShowStream

Evolution Support the enumeration of ADS (starting with Vista)

Issues Backup & restore Forensic DOS Attack Code Execution Detection and removal Window Resource Protection (WRP) Misuse of valid ADS Anti Virus File Version System Control (eg. SVN) Windows Scripting Host User Account Control (UAC) Unsupported on other file systems

Summary ADS exist ADS cannot be disabled ADS can be used ADS can be misused