TIP: Click on subject to list as thread! ANSI
echo: nthelp
to: John Beamish
from: /m
date: 2006-07-14 13:52:44
subject: Re: NTFS - ADS (Alternate Data Streams).

From: /m 


http://www.f-secure.com/weblog/archives/archive-062006.html#00000907

===
Hiding the Unseen       Posted by Antti {at} 17:33 GMT

Many of our readers have probably heard of Alternate Data Streams (ADS) on
NTFS. They're not that well documented and there are only a few tools that
can actually handle them. Lately we've been looking at variants of the
Mailbot family that use hidden streams to hide themselves.

Let's take Mailbot.AZ (aka Rustock.A) as an example. There's only a single
component lying on the disk, and that is a kernel-mode driver. It's stored
as hidden data stream attached to the system32 folder (yes, folders can
have data streams as well)! Saving your data into Alternate Data Streams is
usually enough to hide from many tools. However, in this case, the stream
is further hidden using rootkit techniques, which makes detection and
removal quite challenging. Because Mailbot.AZ is hiding something that's
not readily visible, it's very likely that many security products will have
a tough time dealing with this one...
===

 /m


On Fri, 14 Jul 2006 13:15:55 -0400, "John Beamish"
 wrote:

>The more technically-minded probably already knew about this.  We mere
>mortal, otoh, are not so knowledgeable!
>
>
>Start here:
>http://www.heysoft.de/nt/ntfs-ads.htm
>
>What is an alternate data stream (ADS)?
>
>In NTFS, a file consits of different data streams. One stream holds the
>security information (access rights and such things), another one holds
>the "real data" you expect to be in a file. There may be another stream
>with link information instead of the real data stream, if the file
>actually is a link. And there may be alternate data streams, holding data
>the same way the standard data stream does.
>
>
>
>Continue here: (thanks, Geo, for the link)
>http://www.sysinternals.com/Utilities/Streams.html

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270 5030/786
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.