Good morning,
The latest version of Volatility can extract MFT records:
" • new plugins to parse IE history/index.dat URLs, recover shellbags data, dump
cached files (exe/pdf/doc/etc), extract the MBR and MFT records, explore recently unloaded
kernel modules, dump SSL private and public keys/certs, and display details on process
privileges"
The latest version of analyzeMFT can find ADS files in MFT records:
"Added ADS support.
This is probably a work in progress but it seems to be working so I’ll push this out.
Whenever analyzeMFT encounters a resident $DATA record, it stores a copy of the contents
away for later use. If it encounters a named $DATA record, it does two things:
• A duplicate of the parent record is created and the filename is changed to be
<parent filename>:<ADS filename>.
• All ADS records, parent and children, get a flag set in the new ADS column"
As my CS prof used to say, it is an exercise left to the reader to figure out how to
combine those.....
-David
On Jul 24, 2013, at 8:10 PM, "FRANCIS PROVENCHER"
<FRANCIS.PROVENCHER(a)msp.gouv.qc.ca> wrote:
Hi all,
I'v have a memory dump has an evidence for a case.
Volatility can help me to discover "Alternate data stream" file on the
system?
Thanks for your help!
_______________________________________________
Vol-users mailing list
Vol-users(a)volatilityfoundation.org
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users