top of page

Be careful what you send to the Recycle Bin!

As you know, it is common to use the Windows Recycle Bin to dispose of those files that we no longer use. However, we must pay special attention to what we send to trash, as the security of your data or that of your company may be at stake.


During a Pentest you might even consider including this way to try to extract sensitive information about the environment and assist the Security team to improve the approach and points of attention during the Information Security Awareness campaign for employees.


To extract files from a user's Trash it is necessary to find out which user's SID. To do this, just run the command below:


Enter the C:\ directory and run the command "dir /a" to show all hidden folders.


Access the $Recycle.Bin folder and type the command "dir /a" to view the folder corresponding to the user you want to access.


Access the folder and view the files that are stored in the Recycle Bin using the "dir" command.


I created a folder (tmp) to copy all files from the user's Trash, then copy the files that start with $R.


Access the folder to view the files.


With the information found in the Recycle Bin, a malicious user could gain access to your company's servers.


Network Administrators do not store passwords in text files, spreadsheets. (Use a Password Vault)!!!


21 views0 comments

Recent Posts

See All

Universal Serial Bus flash drives, commonly known as USB flash drives are the most common storage devices which can be found as evidence in Digital Forensics Investigations. Digital forensic investiga

These days I brought some IP cameras home and unfortunately I don't have an NVR to manage. Searching the internet I found c-mor & ZeroMinder's solution - very cool and I would like to share it with yo

These days I was looking for more details about load balancers and found some great tools I need to share with all of you - it´s a free load balancer!! Go to https://kemptechnologies.com/free-vlm-down

bottom of page