Cyber Forensics: Analyzing Data Streams in NTFS

Cyber Forensics: Analyzing Data Streams in NTFS

Adding and Analyzing Resident and Non-Resident Data in NTFS Data Streams and the Master File Table using Hex Editors.

Language : english

Canva Many GEOs

 

Description

The course will help students to learn about the basics of Microsoft Windows File System (NTFS), the Master File Table (MFT) and how data is stored in data streams, both primary and alternate. Students will also get to differentiate between resident and non-resident data and learn how to hide data in the ADS. It would also enable students to analyze the data inside and outside of the MFT and to locate the specific cluster/sector on the hard disk where this data is actually stored. Moreover the students will be able to:

  • Understand the basics of Alternate Data Streams (ADS), their usage and history

  • Adding resident (less than 512 bytes) and non-resident (more than 512 bytes) data in both alternate and primary data streams

  • Analyzing the resident data in any stream by locating it inside the MFT using a common Hex Editor

  • Analyzing the non-resident data in any stream by locating its actual cluster and sector address on the disk

  • Verifying the presence of non-resident data in any data stream with the help of another Hex Editor

  • Practically experiment common Forensics tools and Hex Editors for analyzing data in the MFT and otherwise.

This course will turn out to be very useful for the students who want to understand the basics of computer forensics and file systems as it provides insight to analyzing data stored in the data streams.

Coursera WW

 

Related Posts

Ads Blocker Image Powered by Code Help Pro
Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker or add this website to your whitelist.

Refresh