$INDX ($i30 Index Attributes) Analysis
Within the NTFS filesystem, the contents of directories are organized and stored using special index attributes, primarily $INDEX_ROOT
(for small directories) and $INDEX_ALLOCATION
(for larger directories). The most common index structure, often referred to by forensic tools using its attribute type identifier $i30
, essentially acts as the directory's listing, containing metadata entries for each file and subdirectory residing within it. Each entry in a directory's $i30
index stores information derived from the corresponding item's $MFT
$FILE_NAME
attribute, including its name, MFT reference number, file attributes, file size, and a set of MACB timestamps mirroring the $FN
timestamps.
Forensically, analyzing $i30
index attributes, particularly focusing on slack space and inactive entries, can yield evidence unavailable elsewhere:
Deleted File Metadata Recovery: When a file is deleted, its entry in the parent directory's
$i30
index is marked as inactive but often not immediately overwritten. Forensic tools can parse the B-tree structure of the index and its slack space (unused portions within allocated blocks) to carve out these inactive entries. This can recover metadata (filename, size, attributes,$FN
timestamps) for files whose$MFT
records might have been completely overwritten or are otherwise inaccessible, proving that a file with a specific name existed in that directory at some point.Timeline Reconstruction: The timestamps within
$i30
entries reflect the file's$FN
timestamps, providing another source for building timelines of file activity specifically within the context of their parent directories.Corroboration: Findings from
$i30
analysis can corroborate evidence from$MFT
and$UsnJrnl
regarding file existence, naming, and timing within specific locations.
Specialized tools are typically required for effective $i30
analysis. INDXRipper (by Harel Segev) is a notable utility designed specifically to parse NTFS index attributes, including slack space, to recover metadata for both active and deleted files/directories. Running a command like INDXRipper.exe //./C: --deleted-dirs output.csv
can carve deleted entries from drive C: into a CSV file suitable for analysis in Timeline Explorer. Advanced forensic suites also often include modules for parsing these index attributes.
Last updated