Unlocking the Secrets of Alternate Data Streams: A Comedic Dive into Digital Hide-and-Seek!
Alternate Data Streams are like the secret compartments of your hard drive, hidden in plain sight. Ehsaan Mavani reveals how tools like cut-bytes.py and FileScanner can access them, offering a sneaky peek into what might be lurking in your files. Who knew your PC had a secret life?

Hot Take:
Ah, Alternate Data Streams (ADS) — the secret room behind the bookshelf of the NTFS file system. Just when you thought your files were open books, ADS sneaks in like a ninja, storing data where only the most inquisitive geeks dare to look. It’s like finding out your cat has a double life as a dog whisperer. But fear not, with tools like cut-bytes.py and FileScanner, even the most elusive data streams can’t escape detection!
Key Points:
- Alternate Data Streams (ADS) are used for storing additional data in NTFS files.
- ADS can be accessed with tools like Python scripts on Windows.
- Didier Stevens developed FileScanner in C for scanning ADS on Windows.
- ADS can be used for adversary defense evasion, making them a security concern.
- Tools like cut-bytes.py can show contents of ADS, such as Zone.Identifier.
Already a member? Log in here