• DahGangalang@infosec.pub
    link
    fedilink
    arrow-up
    1
    ·
    8 days ago

    See, so I’ve never seen the purpose of NTFS streams. In a cyber security course, I was warned to look out for Alternate Data Streams, but got an unsatisfactory answer when I prodded the instructor for more (it was apparent that didn’t have anything beyond a surface level understanding of them).

    Your link was informative in grasping what they are, but I still don’t think I’m clear on how they’re used in the “real world”. Like, what (and how) would one use them for a legitimate purpose?