- •The project has been funded by the European Commission. The Education, Audiovisual and
- •Windows Artefacts
- •Content
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Windows Artefacts
- •Methodology
- •Methodology
- •Leaves on harddisk
- •Leaves on Harddisk
- •Leaves on Harddisk
- •Approach to analyzing local tracks
- •Limits: Portable Software
- •Limits: Portable Software
- •Limits Malware
- •Special software
- •Approaches
- •Sandboxies
- •What is a Sandbox
- •What is Sandboxies
- •Advances of Sandboxies
- •Alternatives for sandboxies
- •Virtualization with EvaLaze
- •Virtualization with EvaLaze
- •Sanboxies
- •How does Sandboxies work?
- •Automasition commandline
- •Recovery in Sandboxie
- •Analyse of Sandboxie Results
- •Redirecting Registry
- •Redirecting Registry
- •Logfiles of Hives
- •Analyzing Sanboxie-Registry Hives
- •Analyzing Sanboxie-Registry Hives
- •Runtime behavior
- •Overview
- •Using of Jabber with Jabbin
- •Usage in practise
- •The project has been funded by the European Commission. The Education, Audiovisual and
- •Windows OS-Artifacts
- •Typical application traces
- •File access via mailer
- •FTP-Client
- •FTP-Client
- •FTP-Client
- •FileShare P2P:eMule
- •FileShare P2P: BitTorrent
- •FileShare P2P: BitTorrent
- •FileShare P2P: μTorrent
- •BitTorrent Forensic
- •Virusscanner
- •Firewall Win 7
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •openVPN
- •openVPN
- •The project has been funded by the European Commission. The Education, Audiovisual and
- •Windows OS-Artifacts
- •Operating System
- •Windows Operating System
- •Windows Folder Structure
- •Artifacts of Forensic Interest
- •USER PROFILES
- •Which Version ?
- •Application Data
- •Application Data (subfolders)
- •AppData Local
- •Appdata LocalLow
- •AppData Roaming
- •SUMMARY
- •Registry Description
- ••what kind of information is actually stored there?
- •Registry Information
- •Registry’s Structure
- •HKEY_LOCAL_MACHINE -HKML
- •HKEY_LOCAL_MACHINE -HKML
- •And what about user data?
- •NTUSER.DAT location in Windows XP
- •NTUSER.DAT location in Windows 7
- •Registry Files Examination
- •From Forensics point of view
- •Examples
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •RESTORE POINTS (Windows XP)
- •RESTORE POINTS (Windows 7)
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •RESTORE POINTS (Windows XP)
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •VOLUME SHADOW COPY
HKEY_LOCAL_MACHINE -HKML
• location in a running Windows 7 OS computer
HKEY_LOCAL_MACHINE -HKML
•Examining a Non-Live Registry – Forensic Image of a Windows 7 computer
And what about user data?
•Each user of the system has their own user file
– NTUSER.DAT
•Different path for WINDOWS XP and 7 OS
•Hidden system files
NTUSER.DAT location in Windows XP
NTUSER.DAT location in Windows 7
Registry Files Examination
•Free Tools
–AccessData Registry Viewer
–MiTEC Windows Registry Recovery
–Registry Browser
–RegReport (automatically creates reports of information)
•https://ad-pdf.s3.amazonaws.com/Registry_Quick_Find_Chart_9- 27-10.pdf
•Find Registry Offsets (e.x. AccessData FTK Imager)
•https://ad-pdf.s3.amazonaws.com/Registry%20Offsets%209-8- 08.pdf
From Forensics point of view
Examples
•Registered Owner details
•UserAssist
•HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\Windows NT\CurrentVersion
•HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Explorer\UserAssist
Free tool: http://www.nirsoft.net/utils/userassist_view.html
