Good morning,
The latest version of Volatility can extract MFT records:
" • new plugins to parse IE history/index.dat URLs, recover shellbags data, dump cached files (exe/pdf/doc/etc), extract the MBR and MFT records, explore recently unloaded kernel modules, dump SSL private and public keys/certs, and display details on process privileges"
The latest version of analyzeMFT can find ADS files in MFT records:
"Added ADS support.
This is probably a work in progress but it seems to be working so I’ll push this out. Whenever analyzeMFT encounters a resident $DATA record, it stores a copy of the contents away for later use. If it encounters a named $DATA record, it does two things:
• A duplicate of the parent record is created and the filename is changed to be <parent filename>:<ADS filename>.
• All ADS records, parent and children, get a flag set in the new ADS column"
As my CS prof used to say, it is an exercise left to the reader to figure out how to combine those.....
-David
Hi all,
I'v have a memory dump has an evidence for a case.
Volatility can help me to discover "Alternate data stream" file on the system?
Thanks for your help!
_______________________________________________
Vol-users mailing list
Vol-users@volatilesystems.com
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users