Alternate Data Stream Attack Framework to Perform Stealth Attacks on Active Directory Hosts

7Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

Microsoft’s file system, NTFS, is the most utilised file system by Windows OS versions XP, Vista, 7, and 10. These systems have a little-known file attribute feature known as alternate data streams (ADS) which allows each file in the NTFS file system to have multiple data streams. ADS cannot be removed from the NTFS operating systems. However, the presence of ADS is not inevitably an issue in the OS or file system. Valid instances can be found on systems if scanned and might be valid. Windows OS does not have any in-built tools or applications to determine and remove the presence of existing ADS. This research presents ADSA or alternate data stream attack framework to exploit the alternate data streams and perform cyberattacks on Microsoft operating systems. This research discusses the process of creating and searching alternate data streams with a standard file and an executable binary. The authors executed ADS-hidden executable binary in the ADS. The authors present methods to detect and perform a clean-up by deleting the alternate data stream.

Cite

CITATION STYLE

APA

Bhardwaj, A., Kaushik, K., Maashi, M. S., Aljebreen, M., & Bharany, S. (2022). Alternate Data Stream Attack Framework to Perform Stealth Attacks on Active Directory Hosts. Sustainability (Switzerland), 14(19). https://doi.org/10.3390/su141912288

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free