The Volume Shadow Knows

Поділитися
Вставка
  • Опубліковано 10 гру 2024

КОМЕНТАРІ • 26

  • @johnson90512
    @johnson90512 5 років тому +6

    Great Video! I always learn something when I watch your channel

  • @4n6wizard
    @4n6wizard 3 роки тому +2

    Another awesome video, I mounted an image that contain 6 VSC with Arsenal and utilized Shadow Explorer to recover illegal materials (videos) that were deleted, after I exported them they didn't play, I can only think they most be corrupted.

  • @rab1df0x
    @rab1df0x 5 років тому +1

    thanks i was going to be looking at shadow copies as part of a project so this was good timing

  • @zomgninja
    @zomgninja 5 років тому +1

    Thanks mate, also I like the new banners that pop up. look cool as heck.

  • @MokshaDharma
    @MokshaDharma 4 роки тому +1

    Fabulous video. Thank you!

  • @TmWGaM3rS
    @TmWGaM3rS 3 роки тому +1

    what does block-level copies mean in VSS? I know that creates differential backups, i.e only save changes in data, but i dont truly understand what makes it different by doing it at block-level . Thanks in advance!

    • @13Cubed
      @13Cubed  3 роки тому

      It just means that VSS operates at the block level of the data storage model. More here: en.wikipedia.org/wiki/Block_(data_storage) and en.wikipedia.org/wiki/Shadow_Copy. The data is copied in 16KB "chunks".

  • @dumbbroke1039
    @dumbbroke1039 4 роки тому

    Firstly, thank you for making such great quality video. I was able to access shadow copy under current users profile but unable to access Documents under different users. Is there a way to look into other users profile aswell.

  • @subscribeswithoutanyvide-oz7ph
    @subscribeswithoutanyvide-oz7ph 4 роки тому +1

    Question
    Lets say i have shadow copy for my c drive and i got infected with a ransomeware and it encrypt all my files can i be able to retrieve the un encrypted c drive ?

    • @13Cubed
      @13Cubed  4 роки тому +1

      Unlikely, as nearly all ransomware I've seen will kill all of the volume shadows as one of the first steps.

    • @subscribeswithoutanyvide-oz7ph
      @subscribeswithoutanyvide-oz7ph 4 роки тому

      @@13Cubed oh god , malware authors know what they are doing :/

  • @playmangostingiu2217
    @playmangostingiu2217 2 роки тому

    Interesring video.. I tried to recover a deleted file listed in a vsc, but when I opened it, I found that the file was corrupted, the content was filled with all null values, it was a pdf. Instead I notice that for existing files, recover from vsc get a valid file. Did even happens that to you ? I'm using a full patched win 10 pro. Thank you..

    • @13Cubed
      @13Cubed  2 роки тому

      Hmm, I don't think I've run into this particular problem -- any file I've found that is still present within a volume shadow is usually able to be extracted from that shadow without issue.

    • @lukelegg9915
      @lukelegg9915 Рік тому

      usually this happens because of bitlocker or some other encryption

  • @robinhood3841
    @robinhood3841 4 роки тому

    Is there a way to prevent from copying ntds.dit to a volume shadow ?

    • @13Cubed
      @13Cubed  4 роки тому

      Not sure I understand your question.

  • @sami9348
    @sami9348 5 років тому

    Hi sir, i think you left the important section in forensics, disk forensic. what if the hard drive is curropted and investigator need the data ? how would he do that??

    • @13Cubed
      @13Cubed  5 років тому +3

      That's a little beyond the scope of what I am covering in this episode. Data recovery is an entire topic/field into itself. Here's a great resource: Scott Moulton's myharddrivedied.com

    • @sami9348
      @sami9348 5 років тому

      @@13Cubed thanks sir

  • @emran5897
    @emran5897 5 років тому +1

    Thanks for the video...........

  • @itguru2230
    @itguru2230 2 місяці тому

    If Ransomware deletes the shadow copies, can we recover them?

    • @13Cubed
      @13Cubed  2 місяці тому

      In some cases, it may be possible recover deleted Volume Shadow Copies, though admittedly I've not had much luck with this. There was a Blackhat presentation a few years ago discussing this. So, TL;DR, like so many other things in forensics, "it depends..."

  • @mirelt8202
    @mirelt8202 5 років тому

    I used it many times to recover files from csc

  • @twejassontakey8294
    @twejassontakey8294 4 роки тому +1

    Alternatively I use undelete 11 from Softgate Solutions no need to burden the server with addition configuration which take administrative time. Undelete simply provides a network based recycle bin which the user can quickly recover their files without administrators help