CF Lecture 12 - Windows Forensics
CF Lecture 12 - Windows Forensics
CF Lecture 12 - Windows Forensics
Zunera Jalil
Email: zunera.jalil@mail.au.edu.pk
Data Analysis for OS Forensics 2
• They scan deleted entries, swap or page files, spool files, and
RAM during this process.
• Data and file recovery techniques for these file systems include data
carving, slack space, and data hiding
• Another important aspect of OS forensics is memory forensics, which
incorporates virtual memory, Windows memory, Linux memory, Mac OS
memory, memory extraction, and swap spaces.
• OS forensics also involves web browsing artifacts, such as messaging and
email artifacts.
• Most popular types of Operating Systems are Windows, Linux, Mac, iOS,
and Android.
Windows Forensics 5
4. Print Spooling:
This process occurs when a computer prints files in a Windows environment.
When a user sends a print command from a computer to the printer, the print
spooling process creates a “print job” to some files that remain in the queue
unless the print operation is completed successfully.
Printer configuration is required to be set in either EMF mode or RAW mode.
• In a RAW mode, the print job merely provides a straight graphic dump of
itself.
• In an EMF mode, the graphics are converted into the EMF image format
(Microsoft Enhanced Metafile).
These EMF files can be indispensable and can provide an empirical evidence
for forensic purposes.
Windows Forensics 7
5. Registry: Windows Registry holds a database of values and keys that give
useful pieces of information to forensic analysts.
Windows Registry keeps most of the information pertaining policies, status etc.
in form of keys, sub keys and values.
Windows registry can be worked upon by administrator through application
like ‘regedit’.
Windows can also be supplied with a command like tool like ’reg’ to help
users work on registry.
Registry contains hives under which sub keys are present. These hives play
important role in the overall functioning of the system.
Registry Forensics 9
• Registry keys and associated files that encompasses user activities on the system.
Registry Forensics 10
Registry can reveal information such as time zone, shares, audit policy,
wireless SSIDS, auto start locations, user login, activities, USB removable
devices, trusted devices, cache, cookie and history etc.
Registry Structure 12
Registry Introduction 13
• HKEY_CLASSES_ROOT
• HKEY_CURRENT_USER
• HKEY_LOCAL_MACHINE/SAM
• HKEY_LOCAL_MACHINE/SOFTWARE
• HKEY_LOCAL_MACHINE/SECURITY
• HKEY_LOCAL_MACHINE/SYSTEM
• HKEY_USERS
• HKEY_CURRENT_CONFIG
Registry Hives 16
• A hive is a logical group of keys, sub-keys, and values in the registry that
has a set of supporting files containing backups of its data
• Most of the supporting files for the hives are in the
%SystemRoot%\System32\Config
• Each time a new user logs on to a computer, a new hive is created
• This is called the user profile hive
• A user's hive contains specific registry information pertaining to the user's
application settings, desktop, environment, network connections etc.
located under the HKEY_USERS key
Registry Hives 17
• The permanent parts of the registry are stored as a set of files called the
Hive Files.
• Locations for these files in the hive list sub key in
HKLM\SYSTEM\CurrentControlSet\Control.
• These files are saved in systemroot\System32\Config and updated with
each login.
Registry Hives 18
• This stores four of the five keys in HKEY_LOCAL_MACHINE and one key in
HKEY_USERS:
SAM Contains information stored in the key HKLM\SAM about the Security Accounts
Manager (SAM) service.
SECURITY Contains the security information stored in the key HKLM\SECURITY.
SOFTWARE Contains information stored in the key HKLM\SOFTWARE about the
computer's software configuration.
SYSTEM Contains information stored in the HKLM\SYSTEM about the computer's
system configuration.
DEFAULT Contains the default system information that is stored in the key
HKEY_USERS\.DEFAULT.
When examining registry data from a suspect drive after you have made an acquisition
and are reviewing it in a forensics tool, you need to know the location of these files.
Volatile Hives 29
Some hives are volatile - created when the system starts or user logs in
• HKEY_LOCAL_MACHINE\System\CurrentControlSet
• HKEY_CURRENT_USER
• HKEY_LOCAL_MACHINE\Hardware
Changes in Hive Files 30
Path for Registry Files 31
• Configuration settings
• Application settings
Download directories
Recently accessed files (images, movies, etc.)
AutoStart locations
Applications that start w/ little or NO user interaction
• Tracking info
Attached USB devices (thumb drives, Ext HD, digital cameras)
User activity MRUs
Viewed documents or images
Applications installed or launched (UserAssist keys)
Info of Interest in Registry 35
• Computer name is the name that the user gives to its computer.
• is made once in the lifetime usage of the system
• can be used to trace various activities on network and internet carried by the
user.
• Time of last shutdown is the time at which the system was completely
shut down.
• can lead us to know the status of the user and time stamps of various files
• can co-relate to give an idea of the mental status of the suspect.
• Audit policy information can be very useful as it can let us know about
what types of information/events an investigator should look for in the
event log.
• Service set identifications (SSIDs) maintained by Windows can be useful in
situations where unauthorized access is need to be investigated and IP addresses
needs to be traced
• USB devices connected to computer are also registered via PnP (plug
and play) manager.
Artifacts of Interest 39
• User and passwords in a window system are stored in either of two places:
1. SAM (Security Account Manager)
2. AD (Activity directory) SAM
1. Security Account Manager (SAM) is a database file in Windows XP, Windows Vista and
Windows 7 that stores users' passwords. It can be used to authenticate local and
remote users.
• The user passwords are stored in a hashed format in a registry hive. This file
can be found in %SystemRoot%/system32/config/SAM
FIND it now?
Applications Password Cracking 41
however these are not adequate for systems that use large
passwords.
Password Recovery Tools 45
• Linux is an open source, Unix-like, and elegantly designed operating system that is
compatible with personal computers, supercomputers, servers, mobile devices,
netbooks, and laptops.
• Unlike other OSs, Linux holds many file systems of the ext family, including ext2, ext3,
and ext4.
• Linux can provide an empirical evidence if the Linux-embedded machine is recovered
from a crime scene.
• Following folders and directories will be of interest for investigators:
/etc [%SystemRoot%/System32/config]: This contains system configurations directory that
holds separate configuration files for each application.
/var/log: This directory contains application logs and security logs. They are kept for 4-5
weeks.
/home/$USER: This directory holds user data and configuration information.
/etc/passwd: This directory has user account information.
Linux Forensics 48
• Forensic specialists use a forensic toolkit to collect evidence from a Linux Operating
System.
• The toolkit comprises many tools such as Dmesg, Insmod, NetstatArproute, Hunter.O,
DateCat, P-cat, and NC
Linux Forensics 49
• Helix is the distributor of the Knoppix Live Linux CD. It provides access to a Linux kernel,
hardware detections, and many other applications.
Mac OS X Forensics 50