LetsDefend: NTFS Forensics

LetsDefend: NTFS Forensics

Scenario: Insider threat deleted confidential data. Artifact: $MFT.

1. Tooling (MFTParser)

We ingest the $MFT file into MFTExplorer or Eric Zimmerman's Tools.

2. Timeline Reconstruction

We filter by "File Delete" attribute. We find Project_X_Plans.pdf. Created: 09:00. Accessed: 09:05 (Copied to USB?). Deleted: 09:10. The record remains in the MFT until overwritten, marked as "Unallocated".

Conclusion

Deleting a file on Windows just marks the MFT entry as free. The metadata (and distinct proof of existence) persists.