
Digital Forensics & Anti-Forensics Explained: NTFS Artifacts, ADS, File Carving & Timestomping | Ep. 7
🧠 Episode 7 – Everyday Cyber Podcast
In this episode, host Alex Reid explores the battlefield between digital forensics and anti-forensics — revealing how investigators extract hidden truths from NTFS volumes, and how attackers attempt to cover their tracks.
From Alternate Data Streams (ADS) and Volume Shadow Copies, to timestomping and file wiping, this episode dives into the structures and techniques that define modern forensic investigations — and the countermeasures used to evade them.
🔍 What You'll Learn in This Episode:
Key forensic artifacts in NTFS: $MFT, $I30, $LogFile, $UsnJrnl
How Alternate Data Streams (ADS) are used to hide data
Timestomping, file wiping, and registry key deletion as anti-forensics
Tools like MFTECmd, Bulk Extractor, PhotoRec, and vss_carver.py
How forensic analysts perform file carving, super timelines, and triage collection
The role of Zone.Identifier ADS, VSS, and SDelete in investigations
Techniques attackers use to stay hidden in plain sight — and how to find them
Whether you're learning digital forensics or defending against sophisticated attackers, this episode gives you a detailed breakdown of how investigations work at the file system level.
digital forensics
anti-forensics
alternate data streams
NTFS forensics
volume shadow copy forensics
file carving
timestomping detection
mftecmd tutorial
file wiping
photoRec recovery
zone.identifier ADS
NTFS metadata
ADS malware hiding
super timeline forensics
triage collection
bulk extractor forensic
registry key wiping
forensic tools podcast
NTFS MFT analysis
digital forensic investigation
everyday cyber podcast
Information
- Show
- FrequencyUpdated daily
- Published12 July 2025 at 18:29 UTC
- Length25 min
- Season1
- Episode7
- RatingClean