Before diving into this post, I wanted to say, that I have been teaching digital forensics for a long time by now, and in my Operating System Forensics class, I use Eric Zimmerman‘s tools a lot, and when I say “a lot”, I truly mean it! The course is not about tools, but when it comes to using a tool to form an understanding of what that session was about, then you’ll always find a tool from Eric there (plus others for sure)! This is one thing about how great Eric’s tools are, but for me, there is more than that! Me and my students from time to time find new things, new bugs, etc. I sometimes send Eric a message from inside class and share a sample with him. We most of the times, get the solution fixed while we’re still in class! That is one of the best things about this guy, how much he cares about his tools, and how much support he provides the community! That is why, I doubt you’ll get such support even from a commercial vendor. They will never be able to get back to you this quick.
What does all that mean here? Well, continuing the previous work “Creating a Hidden Prefetch File to Bypass Normal Forensic Analysis” it means we just got a fix or a new feature added to PECmd :)
Let’s check it out. After running the command again using the updated version:
PECmd.exe -d W:\Windows\Prefetch –csv C:\Users\IEUser\Desktop\sleuthADS\UpdatedResults
So, there you go. The solution was done even faster than me writing this post, except that I had to go take a break, before getting back to this :)
Eric is probably going to release this very soon. Thank you so much my friend for your continous and precious work, I’ve said it before and will again “The DFIR Community will always be in debt for you”
And before I forget, there is still more to the Stealthy ADS coming!