Book now with code EOY2025
Slowhand wrote: Wow, that is actually very interesting. . . and useful. I'm going to be playing more with the ADS, and see what comes up. (I don't even want to think of what's hidden on our servers, at work.) Thanks a lot, keatron. Keep those training-like posts comin'.
Opi wrote: LADS Is a very nice freeware tool that detects ADS.[/url]
keatron wrote: 1. Are you using NTFS volume. 2. Are you sure you're seeing the right file. You should see techexamstest.txt, but you shouldn't see techexamstest.txt:ads.txt
keatron wrote: I've actually had nightmares of some nasty perl scripts or shell code being hidden in files waiting for an attacker to come back and make use of.
sprkymrk wrote: One thing to keep in mind if you do use a tool that scans for ADS's is that there are some legitimate ones (okay, maybe legitimate is the wrong word) that Windows does create and use. Off the top of my head I think thumbnail images files are one example. Keatron can you confirm?
KGhaleon wrote: That's pretty nifty, but can you view the data with a Hex editor? KG
Use code EOY2025 to receive $250 off your 2025 certification boot camp!