top of page

NTFS: Metadata with The Sleuth Kit(istat)

In the realm of digital forensics, dissecting the intricacies of file systems is essential for uncovering valuable evidence and insights. One powerful tool for this purpose is The Sleuth Kit, which offers a range of utilities designed to analyze file system metadata.


Understanding istat:

"Istat" is a versatile tool within The Sleuth Kit that specializes in parsing metadata information from various file systems, including NTFS, FAT, and ExFAT. It can be used with forensic image files such as raw, E01, and even virtual hard drive formats like VMDK and VHD. Additionally, istat is capable of analyzing live file systems, providing forensic analysts with flexibility in their investigations.


Usage Example:

To demonstrate the usage of istat, we want to analyze the root directory of the C: drive on a Windows system

In an Administrator command prompt, we would execute the command:


Command :- istat \\.\C: 5


Here, "5" represents the MFT record number reserved for the root of the volume.


Command Line Options:

Istat offers several optional switches to customize its behavior.


"-z," which allows specifying the time zone of the image being analyzed. By default, the local time zone of the analysis system is used, but this can be overridden with the -z flag.

"-s," which enables correcting clock skew in the system. This option is particularly helpful when dealing with systems that may have inaccurate time settings.


MFT Entry Header:

  • Allocation Status: Indicates whether the MFT entry is currently allocated or unallocated.

  • File Allocation: In this instance, the directory is allocated, signifying that it's actively in use.

  • MFT Entry Number: Each MFT entry is assigned a unique number for identification purposes.

  • $LogFile Sequence Number: This value denotes the sequence number associated with the transactional logging information stored in the $LogFile.


$STANDARD_INFORMATION Attribute:

  • Purpose: This attribute stores essential metadata about a file, providing crucial details for file management and access control.

  • Contents:

  • Timestamps: Four timestamps are typically included:

  • Created: Indicates when the file was originally created.

  • Modified: Reflects the last time the file's contents were modified.

  • MFT Entry Modified: Represents the last modification time of the MFT entry itself.

  • Last Accessed: Records the last time the file was accessed.

  • File Attributes: Flags indicating various properties of the file, such as read-only, hidden, system file, etc.

  • Security Information: Permissions and access control settings associated with the file.

  • USN Journal Sequence Number: Used for tracking changes to the file for journaling and auditing purposes.


$FILE_NAME Attribute:

  • Purpose: This attribute contains information about the file's name, location, and other related details.

  • File Name: The primary name of the file.

  • File Namespace: Indicates the namespace in which the file resides (e.g., NTFS, POSIX).

  • Parent Directory: Information about the directory where the file is located.

  • File Attributes: Similar to those in the $STANDARD_INFORMATION attribute, indicating properties like read-only, hidden, system file, etc.

  • Timestamps: Typically includes timestamps for creation, modification, and last access.

  • Hard Link Count: Specifies the number of hard links associated with the file.

  • File Reference Number: Unique identifier for the file within the file system.

  • Security Descriptor: Security-related information such as permissions and access control settings.


Relationship:

  • The $STANDARD_INFORMATION attribute provides general metadata about the file, including timestamps and security information.

  • The $FILE_NAME attribute complements this by providing specific details about the file's name, location, and attributes.


Conclusion:

Understanding the motives behind timestamp modification, both legitimate and malicious, is crucial for effective forensic analysis and system security. By employing diverse detection methods and leveraging forensic tools, analysts can identify potential timestamp anomalies and uncover malicious activity, enhancing system defense and threat mitigation efforts.


34 views0 comments

Comments


bottom of page