Академический Документы
Профессиональный Документы
Культура Документы
! First sector is the Partition Boot Sector ! MFT contains information about all files and folders on
! Similar structure like FAT16 the disk
! Offset 0x30: logical cluster number (8 bytes) for the MFT file ! Including the system files the OS uses
! Information about one file is a record
! Next 15 sectors are reserved ! The MFT is nothing but a table of records
! Holds bootloader code
! The first 16 records are reserved for system files
! Next is MFT Zone that holds the Master File Table ! Records in the MFT are called metadata
(MFT) ! Data about data
! Contains information about every file in the system
L5: Windows System Artifacts
! Files larger than 512 bytes are stored outside the MFT ! The term offset means the location relative to the
! MFT record provides cluster addresses where the file is beginning of something
stored on the drive’s partition ! Numeric data is typically stored in little-endian format
! Referred to as data runs
! E.g. if you are looking at say 4 bytes of data in a hex editor
! Each MFT record starts with a header identifying it as a
resident or nonresident attribute 00 AE 97 02
it signifies the number 0x0297AE00 = 43494912
L5: Windows System Artifacts
! Offset 0x00
MFT record identifier Size of record (0x00000400)
! Identifier : all MFT records begin with hex values 46 49 4C
45 at this offset
! Offset 0x1C to 0x1F
! Size of MFT record; default is 0x0400 (1024) bytes
! Offset 0x14
! Length of header : this is where other record fields (attribute
IDs) start
! Offset information below is relative to where the ! 0x10 : Standard information such as file creation time,
attribute begins permission, etc.
! Offset 0x00 ! 0x20 : Used when list of attributes do not fit in the
! Attribute ID : tells you what information follows 1024 bytes of the record
! Offset 0x04 and 0x05 ! 0x30 : File name
! Size of the attribute from the beginning of the attribute ! 0x80 : File data or data runs
! More available in the book
! The idea is to know (by reading documentations)
! What an attribute ID stands for, and
! How is information corresponding to that attribute
L5: Windows System Artifacts
! Offset relative to beginning of attribute information ! You may see two instances of this attribute in a record
! Offset 0x18 to 0x1F ! One for the short MS-DOS style name
! File’s create date and time; stored in Win32 Filetime format ! Another for the long name
! Offset 0x20 to 0x27 ! Offset 0x04 and 0x05
! Last modified date and time ! Size of this attribute (like in all other attributes)
! Offset 0x28 to 0x2F ! Offset 0x5A onwards
! Last access date and time ! The name
! And there’s more!! ! Use the size to determine how much to read from here
L5: Windows System Artifacts
! Offset 0x08
! Value of 0x00 means resident file
! Value of 0x01 means non-resident file
! If resident file
! Offset 0x10 : Number of bytes of data
! Offset 0x18 : Beginning of data
Attribute ID
! If non-resident file Resident
! Offset 0x40 : Data runs
! A list of cluster addresses where the data can be found
L5: Windows System Artifacts
! Data run:
! 32 B1 07 8C 8C 00 22 63 07 95 ED 32 BC 06 3C 36 01
00
! Every data run has three components
! First: tells the length of the other two components
! Second: run length
Attribute ID ! Third: LCN or VCN
Non-Resident
Data run
Padding
! NTFS provides compression similar to FAT DriveSpace ! Encrypting File System (EFS)
3 ! Introduced with Windows 2000
! Under NTFS, files, folders, or entire volumes can be ! Implements a public key and private key method of
compressed encrypting files, folders, or disk volumes
! Most computer forensics tools can uncompress and
analyze compressed Windows data ! When EFS is used in Windows Vista Business Edition or
higher, XP Professional, or 2000,
! A recovery certificate is generated and sent to the local
Windows administrator account
L5: Windows System Artifacts
! Recovery Key Agent implements the recovery certificate ! When a file is deleted in Windows XP, 2000, or NT
! Which is in the Windows administrator account ! The OS renames it and moves it to a special folder called the
! Windows administrators can recover a key in two Recycle Bin
! Additional attributes store where the file came from
ways
! through Windows or
! from an MS-DOS command prompt ! Can use the del (delete) MS-DOS command
! Eliminates the file from the MFT listing in the same way FAT
! MS-DOS commands
does
! Cipher
! Copy
! Efsrecvr (used to decrypt EFS files)