3 links
tagged with all of: security + forensics
Click any tag below to further narrow down your results
Links
MFTool is a specialized NTFS parser designed for red team operations, allowing direct access to the Master File Table without relying on Windows APIs. It enables users to search for files, retrieve locked or deleted content, and navigate NTFS structures stealthily, catering to the specific needs of security professionals. The tool also features commands for file retrieval, metadata display, and directory enumeration, though it has some limitations, including incomplete parsing of NTFS attributes and unsupported encrypted files.
A Python proof-of-concept script allows users to dump sensitive files such as SAM, SYSTEM, and NTDS.dit from a physical disk without triggering security alerts by bypassing standard Windows file APIs. It operates by directly reading NTFS filesystem structures, obfuscating the output with XOR encryption to avoid detection by EDR/AV systems. This tool is intended for educational purposes only and should be used in a controlled test environment.
RDP poses significant security risks as it is a common target for attackers, making it essential for defenders to understand its event logging. The article details key RDP-related Event IDs, their significance in tracking session activities, and provides a timeline visualization to aid in forensic investigations and identifying unauthorized access. Monitoring successful and unsuccessful logins, session disconnects, and logoffs can help detect suspicious behavior effectively.