Questions tagged [file-system]

A file system is a way of organizing information on a storage device like a computer hard drive.

A file system is a way of organizing information on a storage device like a computer hard drive.

201 questions
7
votes
4 answers

Special form of file system to prevent recovering after secure wipe data

I'm looking for file system with reasonably error corrections, but rugged against forensic after wipe. Say, encrypted container via loop mounted like ext4 - journal file system. This is good performance and secure in many ways. Wiping in this…
trankvilezator
  • 229
  • 2
  • 5
7
votes
2 answers

Possible implementations of networked+encrypted filesystem

Is it possible to implement scheme where remote server just share its filesystem (or resizable container file in it) and it's locally encrypted and mounted? And what is best practical method? (On linux.) Example use is backup storage on not very…
catpnosis
  • 215
  • 1
  • 8
7
votes
1 answer

Run native code from shell on read-only filesystem

I'm researching an embedded device running Linux, busybox, and a few custom services. I've found a way to obtain unprivileged shell access, and trying to see if it's possible to escalate privileges. The kernel is old and looks vulnerable, however…
J. Doe
  • 81
  • 3
7
votes
1 answer

Windows mandatory access control: How to remove “mandatory level” label from the file?

How to remove "mandatory level" label from the file? I have two files, for the first one icacls returns Mandatory Label\Medium Mandatory Level:(NW) for the second icacls doesn't return anything (that means use "default") My problem is that icacls…
7
votes
3 answers

Live OS : secure file deletion

In the case of a Live OS (i.e Tails) where filesystems are kept in RAM, is there any difference in the way a file is deleted ? Specific case considered : files "1.jpg" and "2.jpg" in a running Live OS file 1 is deleted the normal way, file 2 is…
msec24
  • 105
  • 3
7
votes
1 answer

Hadoop security, isolation, and hardening

This is a multiple part question, which all really come back to the main question: How best to protect data in a Hadoop (wikipedia) cluster. (Current version, vanilla main-branch distro - though I'm open to hearing about others). After much…
AviD
  • 72,138
  • 22
  • 136
  • 218
6
votes
1 answer

Are NTFS Alternate File Streams considered a security risk in your organisation; how is it mitigated?

Alternate File Streams allows a user to embed hidden content within any NTFS file. That file can be a TXT file, or MOV for example. Some may consider this a form of steganography, and therefore the same auditing principals may apply. On the other…
makerofthings7
  • 50,090
  • 54
  • 250
  • 536
6
votes
2 answers

What's a good secure file deletion software?

I've used cipher \w which is built into Windows to overwrite free space, but I'm looking for a tool that securely deletes files which have not been deleted yet. It would be a plus (but certainly not necessary) if it had the option to securely delete…
Celeritas
  • 10,039
  • 22
  • 77
  • 144
6
votes
1 answer

Is there a file system allowing read-only access enforced by cryptography

Is there a file system standard (like LUKS) that allows anyone who can plug in the hard drive to read files, but requires a passphrase to modify or write? For example, I can do something similar by signing an unencrypted file with gpg whenever I…
6
votes
2 answers

`rsync -K`-based exploit

In the description of the -K (--keep-dirlinks) flag, the rsync man page gives this warning (my emphasis): One note of caution: if you use --keep-dirlinks, you must trust all the symlinks in the copy! If it is possible for an untrusted user to…
kjo
  • 1,043
  • 2
  • 9
  • 15
6
votes
2 answers

Path Disclosure without ability to read files

So I am a pentester, and I have discovered "feature" on a server that allows me to, essentially, blindly traverse a web server's files (without executing or reading them). The problem is that I cannot figure out a way to demonstrate this as a…
Gray
  • 728
  • 4
  • 15
5
votes
2 answers

Is it possible to browse/access the files on a computer's hard drive by booting from an OS installed in a flash drive?

I have installed Tails in an USB flashdrive and then booted my macbook with it. I noticed that Tails was capable of seeing my macbook's hard drive. Out of curiosity I tried to browse it. Interestingly, I was capable to entering /Users/myName and…
Saturn
  • 563
  • 1
  • 5
  • 10
5
votes
2 answers

Monitoring a specific application for creation or modification of files

I don't know if I'm looking for a file integrity monitoring software here. Basically let's say we have firefox or chromium, let's say the user is watching a youtube video, then we'll find that video in our cache right? Now i would like to know if a…
dierre
  • 295
  • 1
  • 8
5
votes
3 answers

Could browsers improve security of stored passwords by using setuid?

On Unix-esque systems, Mozilla Firefox stores a users' preferences, web history and stored passwords in a set of files that are readible and writeable by that particular user. This makes sense: when the user bob is running Firefox, these files need…
5
votes
1 answer

Repairing corrupt TrueCrypt volumes/disks?

(I'm asking this for a friend of mine as I'm trying to help him with this problem over remote desktop, so if any details are needed, just ask and I will get them). Two entire hard disks were encrypted with TrueCrypt, and then decrypted with a…
Kale Muscarella
  • 153
  • 1
  • 1
  • 5
1 2
3
13 14