mft analysis

8
MFT Analysis http://www.integriography.com/ http://windowsir.blogspot.com/2010/02/mft-an alysis.html

Upload: brittney-goody

Post on 14-Dec-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: MFT Analysis

MFT Analysis

http://www.integriography.com/http://windowsir.blogspot.com/2010/02/mft-analysis.html

Page 2: MFT Analysis

analyzeMFT

• Written by David Kovar, CCE• Python tool to parse $MFT• Parses the attributes of each file in an NTFS

file system• Output is really gross

• CSV format• At least 50 entries for each file• All text

• Used by other applications

Page 3: MFT Analysis

Output FIelds• Record Number• Good - if the entry is valid• Active - if the entry is active• Record type - the type of record• Record Sequence - the sequence number for the record• Parent Folder Record Number• Parent Folder Sequence Number • For the standard information attribute:

– Creation date– Modification date– Access date– Entry date

Page 4: MFT Analysis

Output Fields, cont.• For up to four file name records:

– File name– Creation date– Modification date– Access date– Entry date

• Object ID• Birth Volume ID• Birth Object ID• Birth Domain ID

Page 5: MFT Analysis

Output Fields, cont.• And flags to show if each of the following attributes is present:

– Standard Information, Attribute List, Filename, Object ID, Volume Name, Volume Info, Data, Index Root, Index Allocation, Bitmap, Reparse Point, EA Information, EA, Property Set, Logged Utility Stream

• Notes/Log - Field used to log any significant events or observations relating to this record

• std-fn-shift - Populated if anomaly detection is turned on. Y/N. Y indicates that the FN create date is later than the STD create date.

• usec-zero - Populated if anomaly detection is turned on. Y/N. Y indicates that the STD create date's microsecond value is zero.

Page 6: MFT Analysis

I told you so!• 110575","Good","Inactive","0","5422 - 5426","3","TRANSFERMGR.EXE-

24D2A23F.pf","2009/12/27 18:35:57.625000","2009/12/28 05:32:01.390625","2009/12/27 18:35:57.625000","2009/12/28 05:32:01.390625","2009/12/27 18:35:57.625000","2009/12/27 18:35:57.625000","2009/12/27 18:35:57.625000","2009/12/27 18:35:57.625000","","","","","TRANSFERMGR.EXE-24D2A23F.pf","2009/12/27 18:35:57.625000","2009/12/27 18:35:57.625000","2009/12/27 18:35:57.625000","2009/12/27 18:35:57.625000","","","","","","","","","","","True","False","False","False","False","False","True","False","False","False","False","False","False","False","False"

Page 7: MFT Analysis

Usage

• Usage: analyzeMFT.py [options]• Options:

-h, --help show this help message and exit-f FILE, --file=FILE Read MFT from FILE-o FILE, --output=FILE Write results to FILE-a, --anomaly Turn on anomaly detection-b FILE, --bodyfile=FILE Write MAC information to bodyfile-g, --gui Use GUI for file selection-d, --debug Turn on debugging output

Page 8: MFT Analysis

Extract the MFT

• ntfscopy by Jonathan Tomczak• http:/tzworks.net

>ntfscopy \$MFT ntfs.mft –image ntfs.001 –offset 0x400000

• analyzeMFT by David Kovar• Integriography.com

>python c:\bin\analyzeMFT.py –f ntfs.mft –o mft.txt