Questions tagged [file-system]

A file system is a way of organizing information on a storage device like a computer hard drive.

A file system is a way of organizing information on a storage device like a computer hard drive.

201 questions
1
vote
1 answer

Is storing a client's folder structure a security risk?

At work, we generate sensitive report files for our clients. Currently, these files are stored in cloud storage. Some partners want the files on their local machine, instead, so we will need the directory in which they want to save the files. Would…
Emmett Lin
  • 113
  • 2
1
vote
1 answer

Tell if someone accessed my filesystem

In the organization I work for, the computers are connected in a network, and I can access each PC's filesystem via '\' if I state the "Master User" credentials, once the login window pops up. since I was not connected to the PC via a remote desktop…
Y.S
  • 113
  • 3
1
vote
2 answers

How to secure sensitive information on cloud from administrator (end-to-end encryption)

When I use end-to-end encryption to secure documents and sensitive information on cloud or on computer, there is always a risk of accessing these information by administrator. For example if you use Truecrypt to save a secure container in cloud or…
user1563721
  • 1,099
  • 11
  • 22
1
vote
2 answers

Whitelist-based integrity scanner for Windows EXEs, DLLs, etc

I am looking for some kind of security software that scans your computer for all EXE and DLL files, calculates a cryptographic hash for them, and looks each one up in a database, logging all the ones it doesn't recognize to be manually reviewed…
ansichart
  • 777
  • 4
  • 12
1
vote
1 answer

How much access to the file system does the recent Drupal vulnerability give?

A friends drupal site was hacked. What is strange is that the root directory of the installation at the hosting company (let us call it rootdir) was copied (or renamed) rootdir_hacked and the directory rootdir was left one file index.html saying the…
Bent
  • 174
  • 6
1
vote
2 answers

Are there any artifacts for filesystem forensics in memory?

I have a memory dump. I know it is infected by a rootkit which uses its own file system installed at the end of the disk. Can there be any artifacts in dmp file to show this?
abs2run
  • 11
  • 1
1
vote
1 answer

Linux file information leakage

What information is kept in a linux file about the user and/or system that created it? I want to make some files publicly available, posted on another server such as GitHub or FTP, but I'd rather the original user & system information not be…
user36556
1
vote
3 answers

How to minimise risk to sensitive data in temp files in shared hosting environment before encryption?

openssl_pkcs7_encrypt() requires the data to be encrypted to be read from a file and so unfortunately it requires sensitive data to be written to temporary file before being encrypted. In a shared hosting environment, what steps can I take to…
Prembo
  • 111
  • 3
1
vote
1 answer

Repair Truecrypt NTFS-partition with undetectable filesystem

Long story short: Got 1 TB HDD. Created one fullsized (non-system-)partition on that. Encrypt via TC. One time, via boot, Win presumably formats that (and maybe writes some bytes on it). I manage to restore TC-Header, now TC can mount the partition.…
Droids
  • 11
  • 1
  • 2
1
vote
4 answers

Free space shredding

I'm an avid fan of file system forensics but I'm an amateur so far. I've been reading up on NTFS forensics and I've noticed you sometimes can know if a file was on a certain volume even if it was deleted and the free space shredded with a tool. You…
1
vote
2 answers

Safely generate a non-log file within an application server

How does one go about safely write a temporary file to a location within an application server that is publicly accessible?
Woot4Moo
  • 889
  • 6
  • 10
1
vote
1 answer

What traces are left on a USB stick after using it?

If one uses a FAT32-formatted USB stick on Windows, Linux, or Android, would there be a way to determine on which computer the USB stick was used by examining the USB stick? I know OS can log which USB sticks were connected. As far as I know, the…
1
vote
1 answer

How does Sequoia allow unprivileged users to get root if it requires mounting a filesystem?

CVE-2021-33909 AKA "Sequoia" is a vulnerability against the filesystem code within the Linux kernel. According to the description of the vulnerability from Qualys Successful exploitation of this vulnerability allows any unprivileged user to gain…
Josh
  • 1,096
  • 9
  • 13
1
vote
1 answer

What config files and logs files of a Linux system (CentOS 7) deserve to be monitored by a SIEM?

I am not a security expert (I am more a software developer) and I am working on a project related to a SIEM installation (Wazuh). This installation is only a demo for a customer, in a second time a real scenario project will be implemented. This…
AndreaNobili
  • 235
  • 1
  • 5
1
vote
2 answers

Can someone know who created a cpp file?

I know that one can see the modification, access, and creation date of a file on Windows. And that the creation date, as well as other dates, can be modified at will. I just wonder if it is possible to forensically determine who created a file? For…
turmuka
  • 179
  • 1
  • 9