Created: Thursday, 20 September 2018
Updated: Friday, 21 September 2018

<p>The following scenario demonstrates a potentially confusing situation you might face as an investigator. Knowing extensively the NFTS internals will help you to reach at valid conclusions.</p> <p>Assume that you have located a deleted suspicious file called <strong>showme.jpg.exe</strong> relevant to your case in a NTFS formatted volume. You go to its $MFT record entry, you verify that metadata match and entry flag is unallocated. However, surprisingly you discover that there is only one $DATA resident attribute with content having<br /> [ZoneTransfer] </p> <p>ZoneId=3 </p> <h3>What are your next steps as an investigator?</h3>

ntfs $DATA ADS $MFT

Reconstructing a RAID 5 that holds an NTFS volume without knowing its configuration.

To save readers' precious time I would like to emphasize the fact that that this guide applies in raids containing an NTFS formatted...

About

Professional Experience

Since March 2012, I have worked as a Digital Forensics Examiner, handling a...

Built with...

In March 2024, all backed and client libraries are updated, and the site moved to python3.12 rutime.

In April 2023, this site was...

© 2012 - 2026 Armen Arsakian updated atSunday 15 March 2026Contact: contact at arsakian.com

-3190 . 5137