Rifiuti2 is a for analyzing Windows Recycle Bin INFO2 file. Analysis of Windows Recycle Bin is usually carried out during Windows computer forensics.
Rifiuti2 can extract file deletion time, original path and size of deleted files and whether the trashed files have been permanently removed.
Special Note For 0.7.0
-8
option is obsolete and no more affects output in any way.It is designed to be portable, and runs on command line environment. Depending on relevant Windows recycle bin format, there are 2 binaries to choose from (most users would want first one):
Program | Recycle bin from OS | Purpose |
---|---|---|
rifiuti-vista | Vista – Win10 | Scans \$Recycle.bin style folder |
rifiuti | Win95 – XP/2003 | Reads INFO or INFO2 file in \RECYCLED or \RECYCLER folder |
Run programs without any option for more detail. Here are some more frequently used options:
Option | Purpose |
---|---|
-o <FILE> | Output to file |
-x | Output XML instead of tab-separated fields |
-l <CP> | Display legacy (8.3) filenames and specify its codepage |
Please consult manpage (Unix) or README.html (bundled with Windows binaries) for complete options and detailed usage description.
rifiuti-vista.exe -x -z -o result.xml \case\S-1-2-3\
Scan for index files under \case\S-1-2-3\
, adjust all deletion time for local time zone, and write XML output to result.xml
rifiuti -l CP932 -t “\n” INFO2
Assume INFO2 file is generated from Japanese Windows (codepage 932), and display each field line by line, instead of separated by tab
It has been tested on Linux, Windows 7 and FreeBSD. Some testing on big endian platforms are done with Qemu emulator. More compatibility fix for other architectures welcome.
Windows binaries are officially provided on Github release page.
Note that 0.6.1 version is the last version that can run on Windows XP and 2003; upcoming versions would require Vista or above.
rifiuti2
packaged since late 2014.Others (Compile from source)
For OS where rifiuti2
is not readily available, it is always possible to compile from source.
rifiuti2
follows the usual autotools
based procedure:
./configure && make check && make install
This repo contains all variants of information security & Bug bounty & Penetration Testing write-up…
site:*/sign-in site:*/account/login site:*/forum/ucp.php?mode=login inurl:memberlist.php?mode=viewprofile intitle:"EdgeOS" intext:"Please login" inurl:user_login.php intitle:"Web Management Login" site:*/users/login_form site:*/access/unauthenticated site:account.*.*/login site:admin.*.com/signin/…
Matrix is an open network for secure and decentralized communication. Users from every Matrix homeserver…
Linux Security And Monitoring Scripts are a collection of security and monitoring scripts you can…
A fiber is a unit of execution that must be manually scheduled by the application…
XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site…