Presentation is loading. Please wait.

Presentation is loading. Please wait.

MFT Analysis http://www.integriography.com/ http://windowsir.blogspot.com/2010/02/mft-analysis.html.

Similar presentations


Presentation on theme: "MFT Analysis http://www.integriography.com/ http://windowsir.blogspot.com/2010/02/mft-analysis.html."— Presentation transcript:

1 MFT Analysis http://www.integriography.com/

2 analyzeMFT Written by David Kovar, CCE Python tool to parse $MFT
Parses the attributes of each file in an NTFS file system Output is really gross CSV format At least 50 entries for each file All text Used by other applications

3 Output FIelds Record Number Good - if the entry is valid
Active - if the entry is active Record type - the type of record Record Sequence - the sequence number for the record Parent Folder Record Number Parent Folder Sequence Number For the standard information attribute: Creation date Modification date Access date Entry date

4 Output Fields, cont. For up to four file name records: File name
Creation date Modification date Access date Entry date Object ID Birth Volume ID Birth Object ID Birth Domain ID

5 Output Fields, cont. And flags to show if each of the following attributes is present: Standard Information, Attribute List, Filename, Object ID, Volume Name, Volume Info, Data, Index Root, Index Allocation, Bitmap, Reparse Point, EA Information, EA, Property Set, Logged Utility Stream Notes/Log - Field used to log any significant events or observations relating to this record std-fn-shift - Populated if anomaly detection is turned on. Y/N. Y indicates that the FN create date is later than the STD create date. usec-zero - Populated if anomaly detection is turned on. Y/N. Y indicates that the STD create date's microsecond value is zero.

6 I told you so! 110575","Good","Inactive","0"," ","3","TRANSFERMGR.EXE-24D2A23F.pf","2009/12/27 18:35: ","2009/12/28 05:32: ","2009/12/27 18:35: ","2009/12/28 05:32: ","2009/12/27 18:35: ","2009/12/27 18:35: ","2009/12/27 18:35: ","2009/12/27 18:35: ","","","","","TRANSFERMGR.EXE-24D2A23F.pf","2009/12/27 18:35: ","2009/12/27 18:35: ","2009/12/27 18:35: ","2009/12/27 18:35: ","","","","","","","","","","","True","False","False","False","False","False","True","False","False","False","False","False","False","False","False"

7 Usage Usage: analyzeMFT.py [options]
Options: -h, --help show this help message and exit -f FILE, --file=FILE Read MFT from FILE -o FILE, --output=FILE Write results to FILE -a, --anomaly Turn on anomaly detection -b FILE, --bodyfile=FILE Write MAC information to bodyfile -g, --gui Use GUI for file selection -d, --debug Turn on debugging output

8 Extract the MFT ntfscopy by Jonathan Tomczak analyzeMFT by David Kovar
>ntfscopy \$MFT ntfs.mft –image ntfs.001 –offset 0x400000 analyzeMFT by David Kovar Integriography.com >python c:\bin\analyzeMFT.py –f ntfs.mft –o mft.txt


Download ppt "MFT Analysis http://www.integriography.com/ http://windowsir.blogspot.com/2010/02/mft-analysis.html."

Similar presentations


Ads by Google