- •The project has been funded by the European Commission. The Education, Audiovisual and
- •Windows Artefacts
- •Content
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Windows Artefacts
- •Methodology
- •Methodology
- •Leaves on harddisk
- •Leaves on Harddisk
- •Leaves on Harddisk
- •Approach to analyzing local tracks
- •Limits: Portable Software
- •Limits: Portable Software
- •Limits Malware
- •Special software
- •Approaches
- •Sandboxies
- •What is a Sandbox
- •What is Sandboxies
- •Advances of Sandboxies
- •Alternatives for sandboxies
- •Virtualization with EvaLaze
- •Virtualization with EvaLaze
- •Sanboxies
- •How does Sandboxies work?
- •Automasition commandline
- •Recovery in Sandboxie
- •Analyse of Sandboxie Results
- •Redirecting Registry
- •Redirecting Registry
- •Logfiles of Hives
- •Analyzing Sanboxie-Registry Hives
- •Analyzing Sanboxie-Registry Hives
- •Runtime behavior
- •Overview
- •Using of Jabber with Jabbin
- •Usage in practise
- •The project has been funded by the European Commission. The Education, Audiovisual and
- •Windows OS-Artifacts
- •Typical application traces
- •File access via mailer
- •FTP-Client
- •FTP-Client
- •FTP-Client
- •FileShare P2P:eMule
- •FileShare P2P: BitTorrent
- •FileShare P2P: BitTorrent
- •FileShare P2P: μTorrent
- •BitTorrent Forensic
- •Virusscanner
- •Firewall Win 7
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •openVPN
- •openVPN
- •The project has been funded by the European Commission. The Education, Audiovisual and
- •Windows OS-Artifacts
- •Operating System
- •Windows Operating System
- •Windows Folder Structure
- •Artifacts of Forensic Interest
- •USER PROFILES
- •Which Version ?
- •Application Data
- •Application Data (subfolders)
- •AppData Local
- •Appdata LocalLow
- •AppData Roaming
- •SUMMARY
- •Registry Description
- ••what kind of information is actually stored there?
- •Registry Information
- •Registry’s Structure
- •HKEY_LOCAL_MACHINE -HKML
- •HKEY_LOCAL_MACHINE -HKML
- •And what about user data?
- •NTUSER.DAT location in Windows XP
- •NTUSER.DAT location in Windows 7
- •Registry Files Examination
- •From Forensics point of view
- •Examples
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •RESTORE POINTS (Windows XP)
- •RESTORE POINTS (Windows 7)
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •RESTORE POINTS (Windows XP)
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •VOLUME SHADOW COPY
The project has been funded by the European Commission. The Education, Audiovisual and Culture Executive program (EACEA), TEMPUS IV. The content of this presentation reflects the opinion of the author.
Windows Artefacts
Developers:
C.Yesil
Windows Artefacts
• What are Windows Artefactss
In Windows applications leaves differents marks
•What kind of artefacts exists
–Installed Stand-Alone Programms (main Focus)
–Portable Application (less marks /signatures) –e.g.Trucrypt
–Applications in Browsers (harder, Browser and Applet Forensic, unallocated Space)
Aim
•Students should learn
–Overview about typical User-Applications in Windows and there digital forensic meaning
–Find and evaluate artefacts
Content
•Basic analysismethadology
•Overview about typical applications
•Detailed view in artefacts
Introduction
•How can you find out where an unknown applications leaves artefacts ?
•What can you find out and what not?
•Is there a way for automisation?
Introduction
•Which applications are typical?
–Not possible to say which is typical and which not
•Gamer, Developer, Forensic
•E.g. Computer full of trash
•Not only installed programms
•Executeable programms (portable)
Introduction
• Examples for installed Programms
Introduction
•Examples for installed programms
•Documentprocessing:
•Adobe Reader, freePDF, Ghostscript, OpenOffice, PDF exchange
viewer, ... Browser: Firefox, ...
E-Mail: Thunderbird, Tobit, ...
Chat: Jabbin, Miranda, ...
•Softphone: Sipgate, Skype, Google Phone, ...
•Filetransfer: unprotected: WS-FTP, wxDownload, ...
•protected: openVPN, putty, ...
•Encyrpting: Bitlocker-to-Go, TrueCrypt, ...
•Remote: MaxiVista, UltraVNC, ... Cloud: Dropbox, Wuala, skyDrive, ...
Introduction
•Cleaner: Ccleaner, SuperWinSpy, ...
•Databases: SQLite, SQL Server, ...
Money: Bitcoin, Quicken, StarMoney, Steuer, tax, Wiso, ... Virusprotection: AntiVir, ...
•Packer: 7zip, sfArk, Winrar, Winzip, ... Editoren: gvim, Neo Hexeditor, notepad++, ... Geodaten: Google Earth, ...
•Multimedia:
•Audacity, Audiograbber, CDBurner, div. Codecs, FastVideoIndexer, ffdshow, FLV-Player, Fox Converter, Freecorder, Hauppauge WinTV, IrfanView, MP3- Player Utilities, Picasa, Quicktime, Real Player, Simfy, Stream-Switcher, DVD- Videosoft, VLC Media Player, WAV2MP3-Konverter, Windows Media Player, Windows Movie Maker, ...
•System management: freeCommander, totalCommander, Debugging Tools, Powertoys, ...
Introduction
•Linux and virtualisation:
•andLinux, cygwin, Oracle VirtualBox, Qemu, VMWare + LiveView, ...
•Development Enviroment: Perl, Python, SDKs (Android, Eclipse), ...
Creativitiy: freeMind, ...
•Device Managment:
•Canon-Scanner, Olympus-cameraund , Surfstick, Roland-Synthesizer, ...
•IT-forensic Tools:
•analyzeMFT, Cain & Abel, Data Revoery, dtsearch, EZLog, FastStone Image Viewer, Forensic Card Reader, FTK Imager, Kernel Exchange EDB Viewer, Mandiant Web Historian, Mount Image Pro, PE Builder, Pro Discover, Raid Recovery, PDFStreamDumper, SkypeR, Stellar Phoenix Exchange Mailbox Recovery, WinPcap, Woanware ESEDBViewer, XWF, ...
•Games: WinBoardChess, .....
