Rifiuti2 is a for analyzing Windows Recycle Bin INFO2 file. Analysis of Windows Recycle Bin is usually carried out during Windows computer forensics.
Rifiuti2 can extract file deletion time, original path and size of deleted files and whether the trashed files have been permanently removed.
Special Note For 0.7.0
-8
option is obsolete and no more affects output in any way.It is designed to be portable, and runs on command line environment. Depending on relevant Windows recycle bin format, there are 2 binaries to choose from (most users would want first one):
Program | Recycle bin from OS | Purpose |
---|---|---|
rifiuti-vista | Vista – Win10 | Scans \$Recycle.bin style folder |
rifiuti | Win95 – XP/2003 | Reads INFO or INFO2 file in \RECYCLED or \RECYCLER folder |
Run programs without any option for more detail. Here are some more frequently used options:
Option | Purpose |
---|---|
-o <FILE> | Output to file |
-x | Output XML instead of tab-separated fields |
-l <CP> | Display legacy (8.3) filenames and specify its codepage |
Please consult manpage (Unix) or README.html (bundled with Windows binaries) for complete options and detailed usage description.
rifiuti-vista.exe -x -z -o result.xml \case\S-1-2-3\
Scan for index files under \case\S-1-2-3\
, adjust all deletion time for local time zone, and write XML output to result.xml
rifiuti -l CP932 -t “\n” INFO2
Assume INFO2 file is generated from Japanese Windows (codepage 932), and display each field line by line, instead of separated by tab
It has been tested on Linux, Windows 7 and FreeBSD. Some testing on big endian platforms are done with Qemu emulator. More compatibility fix for other architectures welcome.
Windows binaries are officially provided on Github release page.
Note that 0.6.1 version is the last version that can run on Windows XP and 2003; upcoming versions would require Vista or above.
rifiuti2
packaged since late 2014.Others (Compile from source)
For OS where rifiuti2
is not readily available, it is always possible to compile from source.
rifiuti2
follows the usual autotools
based procedure:
./configure && make check && make install
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…