This document discusses timing attacks against filesystem operations. It begins by explaining timing attack basics, where the time it takes a function to execute can depend on private data, allowing an attacker to determine the private data. It then discusses how filesystem operations like searching a directory have execution times that depend on the search string and file contents, allowing timing attacks. It covers the algorithms and hashes used for directories in common filesystems like ext2-4, FAT, NTFS, and UFS, and how their properties impact susceptibility to timing attacks. Code snippets are provided. Lastly, it discusses optimizing classic directory bruteforcing using timing attacks and provides examples of real attacks.