Alternate Data Stream are artifact of New Technology File system (NTFS) which was introduced by Windows. It was traditionally introduced so that it could provide compatibility for file sharing with the older Hierarchical File system (HFS) of Macintosh systems where the data could be forked into different resources and to store additional data of a file which is called as metadata.
It was introduced for legitimate purpose but the attackers have found a method to exploit this feature by hiding payloads, malwares, keyloggers, etc in any type of file like text-file, audio -file, videos-video, images execute them without the knowledge of the users.
Many users still are unaware of this feature where there could be hidden files and could have a malicious intent as these files are nearly impossible to be detected.
Table of Contents
• NTFS
• Alternate Data Stream
• Key Notes on Alternate Data Stream
• Hiding a file
• ADS with PowerShell
• NTFS to FAT
• Hiding an image in text file
• Hiding Audio in a text file
New Technology File System (NTFS)
In the NTFS, all the allocated sectors in a volume are associated to a file. A file is composed of all the data within a file and that file’s metadata. The metadata usually comprises of items like file name, attribute type, attribute name, file security information etc. The file metadata and file data are considered as a combined set. The Master File Table contains the base file record for every file and directory within a NTFS volume apart from the other file details.
The name of the file and its time stamp are kept as resident attributes. If the attributes for a file cannot accommodate in the MFT file record, those file attributes are termed as non-resident. These non-resident attributes are allocated to one or more clusters in the disk. These clusters hence become the alternate data streams within the NTFS volume.
The default stream is unnamed and the default stream type in NTFS is $DATA.
NTFS stores file in the following format.
Alternate Data Stream
Within NTFS, a file comprises of various data stream. The primary data stream is a unnamed stream which actually contains the data of the file that is visible when we open this stream and hence it is called as the default stream. The second stream is usually the alternate data stream. A file can have more than one Alternate Data Streams for various purpose which hold the metadata about the file. Any of the ADS file can have any malicious content within it which can be appended with the default stream. When you append an ADS file with a default stream file, there will be no change made to the size or the function of that file.
Alternate data streams usually deal with file integrity within the server. A user will never be able to recognise an ADS file by just looking at it and if it comprises of any extra executable or text element within it. Alternate data streams generally deal with maintaining the confidentiality of the file that are being sent or are at rest on the system.
ADS can be used by the attacker to evade any defenses such as static indicator scanning tools and anti-virus software that are implemented by the victim. It is a quite popular method used by attackers to cover their tracks on Windows systems with the use of ADS.
Hiding a file
So, here we are going to learn to make use of Alternate Data stream to hide a file using ‘command-prompt’ in your windows PC. To get you started, let’s start the windows system, and run command prompt as administrator so that these tasks can be performed.
Create a folder to locate your in-use files quickly. Here we have created a folder named jeenali.
Now make use of cd command to lead you to the path of your folder
Here, we are making use of .txt file as our primary stream to demonstrate ADS, you can use any file of your preference.
A .txt file is created and to add content in the file we can used the command;
echo Welcome to ignite Technologies > jeenali.txt
To display the contents of your .txt file, you can use;
type jeenali.txt
To display the contents in the folder including Alternate Data stream, we use
dir /r
In the above image, you can see that there is no hidden file displayed. On directly visiting the GUI of the folder, you see that there is only one file. So now we will move to adding a hidden file in the folder.
Here we will proceed with creating a hidden file. A .txt file is created with hidden ADS and to add content in the file we can used the command;
echo Join Our Training Programs > jeenali.txt:hidden
To display the contents of your newly created .txt file, you can use;
type jeenali.txt: hidden
Here you see that the filename is not recognised, therefore, to see hidden file content, you can type;
more < jeenali.txt:hidden
To display the contents in the folder including Alternate Data stream, we use;
dir /r
Here we see that the ads are seen is also displayed.
To open the file and see the contents of the hidden file you can use
notepad .\jeenali.txt:hidden
here see can notice a notepad file prompts open and the contents are displayed.
ADS with PowerShell
Let’s begin running PowerShell as an administrator
A .txt file is created with hidden ADS and to add content in the file we can used the command;
echo Welcome to Hacking Articles! > raj.txt
Now to create an ADS file, add content and hide it you can use;
Set-Content .\raj.txt -stream text
Hello World
We can see the hidden ADS content using
Get-Content .\raj.txt -stream text
But when you use the dir command, you cannot see your hidden file
dir
To see all the files in the directory you can use
Get-Item -path .\raj.txt -stream *
Here you can see the primary .txt as well as the newly created ADS .txt .
NTFS to FAT
If you transfer an ADS file from NTFS to FAT32 you will be automatically destroying the Alternative Data Stream.
Here, an ADS file was created in an NTFS system but as soon as it is transferred to a FAT32 flash drive, you see the below prompt which won’t allow you to copy the file with ADS. This is because the ADS feature was introduced in NTFS and FAT#@ does not support it.
Hiding an image in text file
So, let us start command prompt as an administrator and change our directory to the folder in which we have our files. To check the contents of the file, type
C:\Users\raj\Desktop\ads> dir
You see that there are two files (one is a text-primary stream and other is a image file). So Now we will append the image file to the text file using;
type panda.jpg > jeeni.txt:panda.jpg
After we are done with appending the primary stream file, we will delete the image file from the folder.
del panda.jpg
Now, you will see that the image file is gone but a new ADS is created and you can check it using
dir /r
Change the directory to system 32, and you can see that your image file is executed when you open the text file which has ADS appended.
C:\Windows\system32>
mspaint.exe C:\Users\raj\Desktop\ads\jeeni.txt:panda.jpg
Hiding Audio in a text file
Now, we can start command prompt as an administrator and change our directory to the folder in which we have our files. To check the contents of the file, type
C:\Users\raj\Desktop\ads> dir
You see that there only a text file and an audio file.
So Now we will append the audio file to the text file using;
type ignite.mp3 > jeeni.txt:ignite.mp3
After we are done with appending the primary stream file, we will delete the audio file from the folder.
del ignite.mp3
Now, you will see that the audio file is gone but a new ADS is created and you can check it using
dir /r
C:\Program Files (x86)\Windows Media Player
wmplayer.exe C:\Users\raj\Desktop\ads\jeeni.txt:ignite.mp3
Conclusion: We hope this article has given you a better understanding of alternate data streams. There are many more methods with which Alternate Data Streams can be performed.
It was introduced for legitimate purpose but the attackers have found a method to exploit this feature by hiding payloads, malwares, keyloggers, etc in any type of file like text-file, audio -file, videos-video, images execute them without the knowledge of the users.
Many users still are unaware of this feature where there could be hidden files and could have a malicious intent as these files are nearly impossible to be detected.
Table of Contents
• NTFS
• Alternate Data Stream
• Key Notes on Alternate Data Stream
• Hiding a file
• ADS with PowerShell
• NTFS to FAT
• Hiding an image in text file
• Hiding Audio in a text file
New Technology File System (NTFS)
In the NTFS, all the allocated sectors in a volume are associated to a file. A file is composed of all the data within a file and that file’s metadata. The metadata usually comprises of items like file name, attribute type, attribute name, file security information etc. The file metadata and file data are considered as a combined set. The Master File Table contains the base file record for every file and directory within a NTFS volume apart from the other file details.
The name of the file and its time stamp are kept as resident attributes. If the attributes for a file cannot accommodate in the MFT file record, those file attributes are termed as non-resident. These non-resident attributes are allocated to one or more clusters in the disk. These clusters hence become the alternate data streams within the NTFS volume.
The default stream is unnamed and the default stream type in NTFS is $DATA.
NTFS stores file in the following format.
Alternate Data Stream
Within NTFS, a file comprises of various data stream. The primary data stream is a unnamed stream which actually contains the data of the file that is visible when we open this stream and hence it is called as the default stream. The second stream is usually the alternate data stream. A file can have more than one Alternate Data Streams for various purpose which hold the metadata about the file. Any of the ADS file can have any malicious content within it which can be appended with the default stream. When you append an ADS file with a default stream file, there will be no change made to the size or the function of that file.
Alternate data streams usually deal with file integrity within the server. A user will never be able to recognise an ADS file by just looking at it and if it comprises of any extra executable or text element within it. Alternate data streams generally deal with maintaining the confidentiality of the file that are being sent or are at rest on the system.
ADS can be used by the attacker to evade any defenses such as static indicator scanning tools and anti-virus software that are implemented by the victim. It is a quite popular method used by attackers to cover their tracks on Windows systems with the use of ADS.
Hiding a file
So, here we are going to learn to make use of Alternate Data stream to hide a file using ‘command-prompt’ in your windows PC. To get you started, let’s start the windows system, and run command prompt as administrator so that these tasks can be performed.
Create a folder to locate your in-use files quickly. Here we have created a folder named jeenali.
Now make use of cd command to lead you to the path of your folder
Here, we are making use of .txt file as our primary stream to demonstrate ADS, you can use any file of your preference.
A .txt file is created and to add content in the file we can used the command;
echo Welcome to ignite Technologies > jeenali.txt
To display the contents of your .txt file, you can use;
type jeenali.txt
To display the contents in the folder including Alternate Data stream, we use
dir /r
In the above image, you can see that there is no hidden file displayed. On directly visiting the GUI of the folder, you see that there is only one file. So now we will move to adding a hidden file in the folder.
Here we will proceed with creating a hidden file. A .txt file is created with hidden ADS and to add content in the file we can used the command;
echo Join Our Training Programs > jeenali.txt:hidden
To display the contents of your newly created .txt file, you can use;
type jeenali.txt: hidden
Here you see that the filename is not recognised, therefore, to see hidden file content, you can type;
more < jeenali.txt:hidden
To display the contents in the folder including Alternate Data stream, we use;
dir /r
Here we see that the ads are seen is also displayed.
To open the file and see the contents of the hidden file you can use
notepad .\jeenali.txt:hidden
here see can notice a notepad file prompts open and the contents are displayed.
ADS with PowerShell
Let’s begin running PowerShell as an administrator
A .txt file is created with hidden ADS and to add content in the file we can used the command;
echo Welcome to Hacking Articles! > raj.txt
Now to create an ADS file, add content and hide it you can use;
Set-Content .\raj.txt -stream text
Hello World
We can see the hidden ADS content using
Get-Content .\raj.txt -stream text
But when you use the dir command, you cannot see your hidden file
dir
To see all the files in the directory you can use
Get-Item -path .\raj.txt -stream *
Here you can see the primary .txt as well as the newly created ADS .txt .
NTFS to FAT
If you transfer an ADS file from NTFS to FAT32 you will be automatically destroying the Alternative Data Stream.
Here, an ADS file was created in an NTFS system but as soon as it is transferred to a FAT32 flash drive, you see the below prompt which won’t allow you to copy the file with ADS. This is because the ADS feature was introduced in NTFS and FAT#@ does not support it.
Hiding an image in text file
So, let us start command prompt as an administrator and change our directory to the folder in which we have our files. To check the contents of the file, type
C:\Users\raj\Desktop\ads> dir
You see that there are two files (one is a text-primary stream and other is a image file). So Now we will append the image file to the text file using;
type panda.jpg > jeeni.txt:panda.jpg
After we are done with appending the primary stream file, we will delete the image file from the folder.
del panda.jpg
Now, you will see that the image file is gone but a new ADS is created and you can check it using
dir /r
Change the directory to system 32, and you can see that your image file is executed when you open the text file which has ADS appended.
C:\Windows\system32>
mspaint.exe C:\Users\raj\Desktop\ads\jeeni.txt:panda.jpg
Hiding Audio in a text file
Now, we can start command prompt as an administrator and change our directory to the folder in which we have our files. To check the contents of the file, type
C:\Users\raj\Desktop\ads> dir
You see that there only a text file and an audio file.
So Now we will append the audio file to the text file using;
type ignite.mp3 > jeeni.txt:ignite.mp3
After we are done with appending the primary stream file, we will delete the audio file from the folder.
del ignite.mp3
Now, you will see that the audio file is gone but a new ADS is created and you can check it using
dir /r
C:\Program Files (x86)\Windows Media Player
wmplayer.exe C:\Users\raj\Desktop\ads\jeeni.txt:ignite.mp3
Conclusion: We hope this article has given you a better understanding of alternate data streams. There are many more methods with which Alternate Data Streams can be performed.
0 comments:
Post a Comment