- •The project has been funded by the European Commission. The Education, Audiovisual and
- •Windows Artefacts
- •Content
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •Windows Artefacts
- •Methodology
- •Methodology
- •Leaves on harddisk
- •Leaves on Harddisk
- •Leaves on Harddisk
- •Approach to analyzing local tracks
- •Limits: Portable Software
- •Limits: Portable Software
- •Limits Malware
- •Special software
- •Approaches
- •Sandboxies
- •What is a Sandbox
- •What is Sandboxies
- •Advances of Sandboxies
- •Alternatives for sandboxies
- •Virtualization with EvaLaze
- •Virtualization with EvaLaze
- •Sanboxies
- •How does Sandboxies work?
- •Automasition commandline
- •Recovery in Sandboxie
- •Analyse of Sandboxie Results
- •Redirecting Registry
- •Redirecting Registry
- •Logfiles of Hives
- •Analyzing Sanboxie-Registry Hives
- •Analyzing Sanboxie-Registry Hives
- •Runtime behavior
- •Overview
- •Using of Jabber with Jabbin
- •Usage in practise
- •The project has been funded by the European Commission. The Education, Audiovisual and
- •Windows OS-Artifacts
- •Typical application traces
- •File access via mailer
- •FTP-Client
- •FTP-Client
- •FTP-Client
- •FileShare P2P:eMule
- •FileShare P2P: BitTorrent
- •FileShare P2P: BitTorrent
- •FileShare P2P: μTorrent
- •BitTorrent Forensic
- •Virusscanner
- •Firewall Win 7
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •Windows Eventlogs
- •openVPN
- •openVPN
- •The project has been funded by the European Commission. The Education, Audiovisual and
- •Windows OS-Artifacts
- •Operating System
- •Windows Operating System
- •Windows Folder Structure
- •Artifacts of Forensic Interest
- •USER PROFILES
- •Which Version ?
- •Application Data
- •Application Data (subfolders)
- •AppData Local
- •Appdata LocalLow
- •AppData Roaming
- •SUMMARY
- •Registry Description
- ••what kind of information is actually stored there?
- •Registry Information
- •Registry’s Structure
- •HKEY_LOCAL_MACHINE -HKML
- •HKEY_LOCAL_MACHINE -HKML
- •And what about user data?
- •NTUSER.DAT location in Windows XP
- •NTUSER.DAT location in Windows 7
- •Registry Files Examination
- •From Forensics point of view
- •Examples
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •RESTORE POINTS (Windows XP)
- •RESTORE POINTS (Windows 7)
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •RESTORE POINTS (Windows XP)
- •RESTORE POINTS vs. VOLUME SHADOW COPY
- •VOLUME SHADOW COPY
Approach to analyzing local tracks
•Before/After-analyse: in virtual machine: with sandbox
•Installation traces:
–Naked installation as basic
–Installation in change-disk
–Comparing images or debugging the installation logs
•Traces of using
–Typical usage of user, start, online registration
–Creating traces
–Analysing the differences between before
•Manuall analysing the image
–System area: installed programms, folders, registry
–User area: Userdata, %AppData%, files, Logfiles , …
–Free spaces, eg. Webmails
21
Limits: Portable Software
•Without installation
•Leaving less traces
No traces on System
Ideally portable software leaves no traces on the host system. Tracks can be part of any installation items (for example, in the registry, in the user profile, or something like that), or be user data that should not be left on a shared computer.
22
Limits: Portable Software
•Still traces
–If you excuting an portable application, there can be still traces on the system without userdata.
•Prefetch
•Or LNK
•Registry
•Event Log
•...
•E.G. Truecrypt: Installtion and mount point in registry, format in prefetch
23
Limits Malware
•Malware can detect virtualisation
•„blue pill“ (executing Malware on Hypervisor)
•Limited usage of Fingerprints
•Differnet behavior in virtual enviroment
24
Special software
•How to get results without knowing something
•Depends on what you are looking for:
•For chats
–Nirsoft
–IEF
–Belkasoft
25
Approaches
•Analyzing the Behavior of Installation and runtime
•Protected Environment
–Sandboxing
–Virtualization
26
Sandboxies
Windows Artefacts
27
What is a Sandbox
•A Sanbox (protected/ unsular Quarantine)
–Special Runtime enviroment for software
–Unsular of the rest of the system
–No action outside of the sandbox
•The behavior of the software can be recorded
•Implementing
–Filesystem and registry are redirected
–Completly simulating of computer
28
What is Sandboxies
•Sandboxie (http://www.sandboxie.com/) is one typical sandbox software that provides an isolated frame such that changes within the frame will not affect the rest of the outside (should).
29
Advances of Sandboxies
•Dataprotection
•Security
•Stability
•Easy to use
•portable
30
