Little additional info: the UsnJrnl is not cyclic, it just allocates new disk space as it grows, leaving the older records as data slack. This means you can carve them. There is a different tool called NTFS log tracker which works very similar but also takes the free disk space from you FTK/Encase/XWF and actually restores “deleted“ records. This way you can go months back
@13Cubed5 жыл бұрын
Very interesting - thanks for sharing that!
@mohamedelbaz92883 жыл бұрын
You are awesome and really talented
@VikasSingh-ch4ef3 жыл бұрын
There's quite a noticeable distance between the Like & Dislike button, I wonder how one could accidentally click on the latter.
@zomgninja5 жыл бұрын
Awesome videos as always!
@lautarob5 жыл бұрын
Thanks!!. Very illustrative and helpful video.
@IqbalHamid3 жыл бұрын
Can anyone please advise, what happens when you run the command: 'fsutil usn deletejournal /N /D C:' at the command prompt? I have heard it clears the usn journal. What does this mean? Is the usn journal actually permanently lost? I believe the command is run to fix corrupted volumes (eg: which prevent chkdsk and defrag from running). How dangerous is it to run this delete journal command?
@13Cubed3 жыл бұрын
This is probably a better explanation than I can (quickly) give you: "Deleting the journal is usually safe, but can have consequences. Applications that are using it will not see file changes between the last time the application ran and when the journal was deleted. Well-programmed applications will detect that the journal was deleted and will revert to an alternative method of finding changed files." See: www.wilderssecurity.com/threads/does-delete-the-journal-speed-up-or-keep-an-os-healthy.375079/
@artemermakov2614 жыл бұрын
Great Video!!!I Really appreciate your work. It looks that ANJP is not accessible any more via official web-page. Is there any alternative URL to get it, please :-)
@13Cubed4 жыл бұрын
I am actually working on an updated episode featuring Eric Zimmerman's MFTECmd, which can be used to parse the $MFT and $J from $UsnJrnl. It does not yet support $LogFile.
@artemermakov2613 жыл бұрын
@@13Cubed BTW, do you know what happened with gettriforce web-page? Why it doesn't accessible any more?
@13Cubed3 жыл бұрын
@@artemermakov261 The author has apparently discontinued the tool. Eric Zimmerman's MFTECmd is a good alternative, and I will have a video covering it later.
@TheCorei714 жыл бұрын
Hi .. I am not able to find this tool anywhere on the internet. Requesting help from forensics lovers. Thanks.
@13Cubed4 жыл бұрын
Try MFTECmd from Eric Zimmerman, which will parse $MFT and $UsnJrnl (specially the $J ADS). $LogFile support is coming, but not available as of now. I am working on a new episode that will cover this. You can look for it in Q1 of next year.
@TheCorei714 жыл бұрын
@@13Cubed much appreciate your response. Thanks and have a rocking successful new year ahead 🤠.
@troyschnack4 жыл бұрын
@@13Cubed Thanks for the info. Playing with MFTECmd this weekend. SANS Zimmerman poster also helpful for command syntax and files to export.
@Amm92 жыл бұрын
Silly question. So these artifacts would be beneficial In a case where the objective is to determine if certain documents were deleted after a specified date?
@13Cubed2 жыл бұрын
That's one use case -- potentially being able to determine that something was deleted, and *when* it was deleted. File renames, moves, and many other OpCodes are tracked by the journals. Check out the follow-up episode here: kzbin.info/www/bejne/laKonYmQf9affbs
@Amm92 жыл бұрын
@@13Cubed I just used these artifacts in a theft of IP case to locate show that a document existed on the users desktop at some point. Thanks for the informative video.
@Sysshad6 ай бұрын
what if you delete the file with an application that actually writes zeroes on the disk (instead of setting the deleted flag), can you still retrieve it here ?
@13Cubed6 ай бұрын
No, if a file is overwritten with null bytes or random data, your best bet for recovery would be via volume shadow copy, if the file happened to still be present in one of those copies.
@mimikatz5 жыл бұрын
Awesome thank you! Is the tool now free? One request video if possible!! Could you possibly do a whole DFIR investigation on one box. Say steps you’d take for imaging the hose, DF Analysis, timeline analysis is, then memory analysis? Awesome content. Very helpful
@13Cubed5 жыл бұрын
Thanks - and to answer your question, yes and no. There is a free version of the tool, which is what I was using here. There is also a paid commercial version available that provides additional features. And regarding your request -- that's actually in-work. It's a scenario-based episode involving IP theft, showing triage image acquisition and analysis.
@mimikatz5 жыл бұрын
13Cubed I just downloaded it today at work! Going to give it a go later. Can’t wait for that video. It will be awesome!
@t0m3czek4 жыл бұрын
Great tutorial! How can I use this to inspect renaming of the files? I am studying DF module and one of the tasks is to find how files were moved and renamed. When I put the name of the file the only result I get is where it was placed on disk and then that it was moved to the different directory. How to track file renaming eg: Secret.txt -> Santa.mp3? Cheers.
@13Cubed4 жыл бұрын
You'll find a file renames section within ANJP. Shimcache may also help you here (for executables). If an executable is renamed, it will be re-shimmed. If the M times tracked by the shimcache match exactly (especially up to 64-bit resolution), there is high confidence you are looking at the same file. Also, shimcache parsing tools will place the newest (most recently shimmed) entries at the top of the list. So, if you see evil.exe with X M-Time, and then above that you see svchost.exe with the same X M-Time, you're probably looking at the same file that has been renamed from evil.exe to svchost.exe.
@t0m3czek4 жыл бұрын
@@13Cubed Thanks for fast reply. After watching another tutorial (webinar) I have found the solution. If you click on "usn record listing" (the one that shows all the transaction events), you can check the "usn record reason" for the file or directory and the most important "usn rcd file ref#". So in a nutshell if the file has been renamed, you can filer by the "usn rcd file ref#" and it will show you original and the renamed file. That doesn't apply if you change the directory of the file for some reason. Hope that makes sense. The webinar I was talking about kzbin.info/www/bejne/sHy9nYueipeAgLM - the renaming solution starts at 27:30. I would like to add one more thing when you are looking for directory or a file/files that you don't know the full name or path use the %% syntax. Eg: "%\Users\Delikwent\Desktop\secret%" Cheers.
@FahadAldosary5 жыл бұрын
Thank you so much for all amazing educational videos.
@SleepyStories-b8r Жыл бұрын
Where can we find this tool, i have looked all over the web and nothin
@13Cubed Жыл бұрын
See the video's description :) "Triforce ANJP is no longer available. After you've watched this episode, please check out "Introduction to MFTECmd" which covers the same information in greater detail, and highlights an alternative tool to parse these artifacts."
@smh45363 жыл бұрын
why did this tool just disappear ?
@13Cubed3 жыл бұрын
The developer discontinued it. Notice the description of the episode which points you to a new episode and a new tool: kzbin.info/www/bejne/laKonYmQf9affbs
@smh45363 жыл бұрын
@@13Cubed I see. Ill check out the video but I did really like the simplicity of anjp
@13Cubed3 жыл бұрын
@@smh4536 I think you'll like MFTECmd for parsing the $MFT and $UsnJrnl (no $LogFile support yet). It's very straightforward and easy to use.
@maingameapaman4 жыл бұрын
Is there any difference in mft or in logfile record if i extract those files from disk image ? (not from live disk)
@13Cubed4 жыл бұрын
Not sure I understand what you are asking. The MFT will point to the cluster run on disk (unless the file is resident), and there would be logfile transactional data to accompany that file (depending on the timeframe, of course).
@maingameapaman4 жыл бұрын
@@13Cubed another question, is it possible to clean logfile without reformating the drive ?
@eduardmart12374 жыл бұрын
How can I download this soft? Are there free alternative?
@d_o_o_m_e_d59394 жыл бұрын
You can boot from a usb and mount the windows partition. The $ files are hidden so just open the terminal and type file “$MFT”