That's definitely one way that you can do it.
I think someone was going to extend the mftparser plugin to extract
ADS as well, or at least someone had approached me about it. It is
possible to extend that plugin to do it without having to use other
tools, I think I might already have the vtypes defined as well though
I'm not sure. I don't have the time to extend it myself until
sometime after blackhat is over, however.
All the best,
-gleeda
On Thu, Jul 25, 2013 at 9:03 AM, David Kovar <dkovar(a)gmail.com> wrote:
Good morning,
The latest version of Volatility can extract MFT records:
" • new plugins to parse IE history/index.dat URLs, recover shellbags data,
dump cached files (exe/pdf/doc/etc), extract the MBR and MFT records,
explore recently unloaded kernel modules, dump SSL private and public
keys/certs, and display details on process privileges"
The latest version of analyzeMFT can find ADS files in MFT records:
"Added ADS support.
This is probably a work in progress but it seems to be working so I’ll push
this out. Whenever analyzeMFT encounters a resident $DATA record, it stores
a copy of the contents away for later use. If it encounters a named $DATA
record, it does two things:
• A duplicate of the parent record is created and the filename is changed to
be <parent filename>:<ADS filename>.
• All ADS records, parent and children, get a flag set in the new ADS
column"
As my CS prof used to say, it is an exercise left to the reader to figure
out how to combine those.....
-David
On Jul 24, 2013, at 8:10 PM, "FRANCIS PROVENCHER"
<FRANCIS.PROVENCHER(a)msp.gouv.qc.ca> wrote:
Hi all,
I'v have a memory dump has an evidence for a case.
Volatility can help me to discover "Alternate data stream" file on the
system?
Thanks for your help!
_______________________________________________
Vol-users mailing list
Vol-users(a)volatilityfoundation.org
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users
_______________________________________________
Vol-users mailing list
Vol-users(a)volatilityfoundation.org
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users
--
PGP Fingerprint: 2E87 17A1 EC10 1E3E 11D3 64C2 196B 2AB5 27A4 AC92