in 02025 CE ?
"in a investigation, details matter" -Dr. Emma Watson, OBE, Bill and Ted's Bogus Journey
- Endpoints: more than you may think
- Serverless, chatbots, APIs: maybe filesystems less important
- although
../won't stop and that's a filesystem path polite cough
- although
- how much and what kinds of things they can store
- permissions and acccess controls may restrict access
- starting with read-only mode!
- Modern operating systems have many self-defense features, including in filessystems
- Mac SIP, Linux SELinux & AppArmour, Windows ... so many things
- Filesystem type and configurations vary, with different evidence (or precision) available
- Does it record Access time (atime) ? Sometimes ...
- Does it record file/folder creation (B) ? Sometimes ...
- versus: other host data: cache, memory, swap
- different tradeoffs and evidence vs network capture
- Timestamps and local activity
- Recovered file artifacts: malware, logs, archives, configuration, extortion demands
- browser history and downloaded files
- office app history and temp files
- malware and misused tools
- Deleted or moved files and folders may be recoverable
- Usually requires you to get the entire file system with forensics tools
- Live (running) file systems may give you access to volatile data
- won't be there in a "dead disk" analysis (/proc, /sys, remote mounts )
- NTFS: almost every Windows system you will see ... vs DOS FS and 'rare birds'
- [flash file systems]: phones, tablets, devices ... initramfs anyone ?