Skip to content

Latest commit

 

History

History
 
 

NTFSObjectID

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

Two C source files and the compiled version of a proof of concept for stealth file opening.
"Stealth" relies on fact that if you open some file using its GUID instead of name, huge parts of forensics/monitoring tools will totally fail, not being able to identify the file, find the process opening your file, etc.
Sysinternals "handle.exe" is one of such GUID-unaware apps. The same also affected Process Explorer, but it was fixed somewhere near version 16.30.

Note: For code simplicity, I am assuming your test file stays on the volume mounted as C:

If you want to try on your own:

  1. Compile sources or unpack the zip
  2. Create your test file: echo test > stealthopentest.txt
  3. Get the guid: GetNTFSObjectID stealthopentest.txt
  4. Open the file using your guid: StealthOpen {your-guid-goes-here}
  5. Play with your favourite tools, trying to figure out if file open operation was properly registered
  6. Press Enter in the StealthOpen.exe console to close the handle and terminate process