NTFS Journal Forensics

  Рет қаралды 20,305

13Cubed

13Cubed

Күн бұрын

Пікірлер: 40
@Lateronwecome
@Lateronwecome 5 жыл бұрын
Little additional info: the UsnJrnl is not cyclic, it just allocates new disk space as it grows, leaving the older records as data slack. This means you can carve them. There is a different tool called NTFS log tracker which works very similar but also takes the free disk space from you FTK/Encase/XWF and actually restores “deleted“ records. This way you can go months back
@13Cubed
@13Cubed 5 жыл бұрын
Very interesting - thanks for sharing that!
@mohamedelbaz9288
@mohamedelbaz9288 3 жыл бұрын
You are awesome and really talented
@VikasSingh-ch4ef
@VikasSingh-ch4ef 3 жыл бұрын
There's quite a noticeable distance between the Like & Dislike button, I wonder how one could accidentally click on the latter.
@zomgninja
@zomgninja 5 жыл бұрын
Awesome videos as always!
@lautarob
@lautarob 5 жыл бұрын
Thanks!!. Very illustrative and helpful video.
@IqbalHamid
@IqbalHamid 3 жыл бұрын
Can anyone please advise, what happens when you run the command: 'fsutil usn deletejournal /N /D C:' at the command prompt? I have heard it clears the usn journal. What does this mean? Is the usn journal actually permanently lost? I believe the command is run to fix corrupted volumes (eg: which prevent chkdsk and defrag from running). How dangerous is it to run this delete journal command?
@13Cubed
@13Cubed 3 жыл бұрын
This is probably a better explanation than I can (quickly) give you: "Deleting the journal is usually safe, but can have consequences. Applications that are using it will not see file changes between the last time the application ran and when the journal was deleted. Well-programmed applications will detect that the journal was deleted and will revert to an alternative method of finding changed files." See: www.wilderssecurity.com/threads/does-delete-the-journal-speed-up-or-keep-an-os-healthy.375079/
@artemermakov261
@artemermakov261 4 жыл бұрын
Great Video!!!I Really appreciate your work. It looks that ANJP is not accessible any more via official web-page. Is there any alternative URL to get it, please :-)
@13Cubed
@13Cubed 4 жыл бұрын
I am actually working on an updated episode featuring Eric Zimmerman's MFTECmd, which can be used to parse the $MFT and $J from $UsnJrnl. It does not yet support $LogFile.
@artemermakov261
@artemermakov261 3 жыл бұрын
@@13Cubed BTW, do you know what happened with gettriforce web-page? Why it doesn't accessible any more?
@13Cubed
@13Cubed 3 жыл бұрын
@@artemermakov261 The author has apparently discontinued the tool. Eric Zimmerman's MFTECmd is a good alternative, and I will have a video covering it later.
@TheCorei71
@TheCorei71 4 жыл бұрын
Hi .. I am not able to find this tool anywhere on the internet. Requesting help from forensics lovers. Thanks.
@13Cubed
@13Cubed 4 жыл бұрын
Try MFTECmd from Eric Zimmerman, which will parse $MFT and $UsnJrnl (specially the $J ADS). $LogFile support is coming, but not available as of now. I am working on a new episode that will cover this. You can look for it in Q1 of next year.
@TheCorei71
@TheCorei71 4 жыл бұрын
@@13Cubed much appreciate your response. Thanks and have a rocking successful new year ahead 🤠.
@troyschnack
@troyschnack 4 жыл бұрын
@@13Cubed Thanks for the info. Playing with MFTECmd this weekend. SANS Zimmerman poster also helpful for command syntax and files to export.
@Amm9
@Amm9 2 жыл бұрын
Silly question. So these artifacts would be beneficial In a case where the objective is to determine if certain documents were deleted after a specified date?
@13Cubed
@13Cubed 2 жыл бұрын
That's one use case -- potentially being able to determine that something was deleted, and *when* it was deleted. File renames, moves, and many other OpCodes are tracked by the journals. Check out the follow-up episode here: kzbin.info/www/bejne/laKonYmQf9affbs
@Amm9
@Amm9 2 жыл бұрын
@@13Cubed I just used these artifacts in a theft of IP case to locate show that a document existed on the users desktop at some point. Thanks for the informative video.
@Sysshad
@Sysshad 6 ай бұрын
what if you delete the file with an application that actually writes zeroes on the disk (instead of setting the deleted flag), can you still retrieve it here ?
@13Cubed
@13Cubed 6 ай бұрын
No, if a file is overwritten with null bytes or random data, your best bet for recovery would be via volume shadow copy, if the file happened to still be present in one of those copies.
@mimikatz
@mimikatz 5 жыл бұрын
Awesome thank you! Is the tool now free? One request video if possible!! Could you possibly do a whole DFIR investigation on one box. Say steps you’d take for imaging the hose, DF Analysis, timeline analysis is, then memory analysis? Awesome content. Very helpful
@13Cubed
@13Cubed 5 жыл бұрын
Thanks - and to answer your question, yes and no. There is a free version of the tool, which is what I was using here. There is also a paid commercial version available that provides additional features. And regarding your request -- that's actually in-work. It's a scenario-based episode involving IP theft, showing triage image acquisition and analysis.
@mimikatz
@mimikatz 5 жыл бұрын
13Cubed I just downloaded it today at work! Going to give it a go later. Can’t wait for that video. It will be awesome!
@t0m3czek
@t0m3czek 4 жыл бұрын
Great tutorial! How can I use this to inspect renaming of the files? I am studying DF module and one of the tasks is to find how files were moved and renamed. When I put the name of the file the only result I get is where it was placed on disk and then that it was moved to the different directory. How to track file renaming eg: Secret.txt -> Santa.mp3? Cheers.
@13Cubed
@13Cubed 4 жыл бұрын
You'll find a file renames section within ANJP. Shimcache may also help you here (for executables). If an executable is renamed, it will be re-shimmed. If the M times tracked by the shimcache match exactly (especially up to 64-bit resolution), there is high confidence you are looking at the same file. Also, shimcache parsing tools will place the newest (most recently shimmed) entries at the top of the list. So, if you see evil.exe with X M-Time, and then above that you see svchost.exe with the same X M-Time, you're probably looking at the same file that has been renamed from evil.exe to svchost.exe.
@t0m3czek
@t0m3czek 4 жыл бұрын
@@13Cubed Thanks for fast reply. After watching another tutorial (webinar) I have found the solution. If you click on "usn record listing" (the one that shows all the transaction events), you can check the "usn record reason" for the file or directory and the most important "usn rcd file ref#". So in a nutshell if the file has been renamed, you can filer by the "usn rcd file ref#" and it will show you original and the renamed file. That doesn't apply if you change the directory of the file for some reason. Hope that makes sense. The webinar I was talking about kzbin.info/www/bejne/sHy9nYueipeAgLM - the renaming solution starts at 27:30. I would like to add one more thing when you are looking for directory or a file/files that you don't know the full name or path use the %% syntax. Eg: "%\Users\Delikwent\Desktop\secret%" Cheers.
@FahadAldosary
@FahadAldosary 5 жыл бұрын
Thank you so much for all amazing educational videos.
@SleepyStories-b8r
@SleepyStories-b8r Жыл бұрын
Where can we find this tool, i have looked all over the web and nothin
@13Cubed
@13Cubed Жыл бұрын
See the video's description :) "Triforce ANJP is no longer available. After you've watched this episode, please check out "Introduction to MFTECmd" which covers the same information in greater detail, and highlights an alternative tool to parse these artifacts."
@smh4536
@smh4536 3 жыл бұрын
why did this tool just disappear ?
@13Cubed
@13Cubed 3 жыл бұрын
The developer discontinued it. Notice the description of the episode which points you to a new episode and a new tool: kzbin.info/www/bejne/laKonYmQf9affbs
@smh4536
@smh4536 3 жыл бұрын
@@13Cubed I see. Ill check out the video but I did really like the simplicity of anjp
@13Cubed
@13Cubed 3 жыл бұрын
@@smh4536 I think you'll like MFTECmd for parsing the $MFT and $UsnJrnl (no $LogFile support yet). It's very straightforward and easy to use.
@maingameapaman
@maingameapaman 4 жыл бұрын
Is there any difference in mft or in logfile record if i extract those files from disk image ? (not from live disk)
@13Cubed
@13Cubed 4 жыл бұрын
Not sure I understand what you are asking. The MFT will point to the cluster run on disk (unless the file is resident), and there would be logfile transactional data to accompany that file (depending on the timeframe, of course).
@maingameapaman
@maingameapaman 4 жыл бұрын
@@13Cubed another question, is it possible to clean logfile without reformating the drive ?
@eduardmart1237
@eduardmart1237 4 жыл бұрын
How can I download this soft? Are there free alternative?
@d_o_o_m_e_d5939
@d_o_o_m_e_d5939 4 жыл бұрын
You can boot from a usb and mount the windows partition. The $ files are hidden so just open the terminal and type file “$MFT”
@emran5897
@emran5897 5 жыл бұрын
Thanks for the video...
A File's Life - File Deletion and Recovery
30:26
13Cubed
Рет қаралды 7 М.
It’s all not real
00:15
V.A. show / Магика
Рет қаралды 20 МЛН
Cat mode and a glass of water #family #humor #fun
00:22
Kotiki_Z
Рет қаралды 42 МЛН
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 53 МЛН
Let's Talk About Shimcache - The Most Misunderstood Artifact
21:51
Windows NTFS Index Attributes ($I30 Files)
13:14
13Cubed
Рет қаралды 21 М.
NTFS File System Explained
32:13
TechsavvyProductions
Рет қаралды 19 М.
Creative Windows Evasion and Forensics with Yarden Shafir
1:14:19
Off By One Security
Рет қаралды 2,8 М.
NTFS Forensics and the Master File Table
21:56
Jonathan Adkins
Рет қаралды 60 М.
Email Header Analysis and Forensic Investigation
22:59
13Cubed
Рет қаралды 153 М.
The Master File Table Lecture Video Part 1
16:03
Jonathan Adkins
Рет қаралды 11 М.
Introduction to Memory Forensics
23:24
13Cubed
Рет қаралды 78 М.
ShellBag Forensics
14:08
13Cubed
Рет қаралды 30 М.
Обзор файловых систем FAT, NTFS и UFS
1:31:46
Dmitry Ketov
Рет қаралды 21 М.
It’s all not real
00:15
V.A. show / Магика
Рет қаралды 20 МЛН