- Mastering Reverse Engineering
- Reginald Wong
- 253字
- 2021-06-10 19:40:23
The filesystem
The filesystem is where data is stored directly to the physical disk drive. These filesystems manage how files and directories are stored in the disk. Various disk filesystems have their own variation of efficiently reading and writing data.
There are different disk filesystems such as FAT, NTFS, ex2, ex3, XFS, and APFS. Common filesystems used by Windows are FAT32 and NTFS. Stored in the filesystem is information about the directory paths and files. It includes the filename, size of the file, date stamps, and permissions.
The following screenshot shows the information stored in the filesystem about bfsvc.exe:

In previous MacOS X versions, file information and data are stored in resource forks. Resource forks are actually deprecated but backward compatibility still exists on recent versions of MacOS. A file has two forks stored in the filesystem, the data fork and the resource fork. The data fork contains unstructured data, while the resource fork contains structured data. The resource fork contains information such as the executable machine code, icons, shape of an alert box, string used in the file, and so forth. For instance, if you wanted to back up a Mac application by simply moving it to a Windows hard drive then moving it back, the Mac application will no longer open. While transferring, only the file gets transferred but the resource fork gets stripped out in the process. Simple copy tools don't respect the forks. Instead, Mac developers developed tools to synchronize files to and from external disks.
- Android應(yīng)用安全實(shí)戰(zhàn):Frida協(xié)議分析
- 腦洞大開:滲透測試另類實(shí)戰(zhàn)攻略
- Metasploit Penetration Testing Cookbook(Second Edition)
- 信息系統(tǒng)安全檢測與風(fēng)險評估
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- 深入淺出隱私計算:技術(shù)解析與應(yīng)用實(shí)踐
- Penetration Testing with Perl
- CTF競賽權(quán)威指南(Pwn篇)
- 數(shù)據(jù)安全與流通:技術(shù)、架構(gòu)與實(shí)踐
- 構(gòu)建新型網(wǎng)絡(luò)形態(tài)下的網(wǎng)絡(luò)空間安全體系
- 捍衛(wèi)隱私
- 云計算安全防護(hù)技術(shù)
- 信息內(nèi)容安全管理及應(yīng)用
- Android Application Security Essentials
- 黑客攻防入門