SlideShare a Scribd company logo
Mining Digital Evidence in Microsoft Windows   –  Answering Who, When, Why and How?
Agenda CSI Computer Crime and Security Survey, 2007 What is Computer Forensics? Laws of computer Forensics 10 Forensics avenues in Windows XP
A Quick CSI-FBI 2007 Survey Summary The average annual loss in 2007 - $350,424  Average annual loss in the previous year - $168,000.  Not since the 2004 report have average losses been this high! 46% of the overall respondents said that they had suffered a security incident. Almost one-fifth (18 percent) of those respondents who suffered one or more kinds of security incident further said they’d suffered a “ targeted attack ” Financial fraud  - the source of the greatest financial losses.
CSI Computer Crime and Security Survey Insider abuse of network access or e-mail -  the most prevalent security problem  – 59% percent of respondents Virus incidents – 52% percent of respondents Dollar Amount Losses  Financial Fraud - $21,124,750 Virus (Worms / Spyware) - $8,391,800 Theft of Confidential Data - $5,685,000 Insider abuse of resources - $2,889,700 Total losses for 2007 - $ 66,930,950
CSI Computer Crime and Security Survey How many Incidents in the past twelve months?
Computer Forensics – the laws First Law of Computer Forensics There is evidence of every action.   Harlan Carvey’s Corollary  : Once you understand what actions or conditions create or modify an artifact, then the absence of that artifact is itself an artifact.
Tip of the “Digital” Iceberg Data as seen by a casual observer using common tools (Explorer Window, cmd shell, web browser etc. ) Data as seen by Forensic Investigators using his sophisticated toolkit. May include deleted data, hidden data, unauthorized information and records of illegal activity!
Mining Windows XP
Windows XP – Market Share 92.69% of the people surfing the Web use Windows on PCs  Windows XP’s share - 79.32% Windows Vista – 7.38% Source: http://marketshare.hitslink.com
10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk)  Restore Point Forensics
10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk)  Restore Point Forensics
Mining NTFS Attributes MFT entry
Mining $logfile  $Logfile entry in the MFT contains the log of all file system transactions The deletion of a file leaves several entries in $Logfile It is not unusual to find files that are no longer on the disk Also shows that the file was used by the system Encase $logfile parser Enscript
Mining NTFS timestamps NTFS has four timestamps: Creation time Last accessed time Last written time Last Modification time Windows 64-Bit Time Stamp It is an 8-byte string (64 bits),  its most significant value is 01h, which is located at the far right of the string as it is stored in little endian. The FN and SIA attributes
10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk)  System Restore Points
Windows Registry Registry files are essentially databases containing information and settings for Hardware Software Users Preferences A registry hive is a group of keys, subkeys, and values in the registry that has a set of supporting files containing backups of its data.  In Windows 98, the registry files are named User.dat and System.dat.  In Windows Millennium Edition, the registry files are named Classes.dat, User.dat, and System.dat.  In Win XP, the registry files are available in C:\windows\system32\config folder
Mining Windows Registry Multiple forensic avenues in the registry! System and User-specific settings UserAssist MuiCache MRU Lists ProgramsCache StreamMRU Shellbags Usbstor IE passwords and many more! Demo
10 Forensics avenues in Windows XP NTFS attributes Registry Files Prefetch Files (.pf) Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk)  System Restore Points
The Prefetch feature Microsoft created a Prefetch cache to improve boot and application launch time. By caching commonly used applications the OS can determine to apportion system resources in anticipation that the user will access the application.  When an application is launched the system updates an entry in the path  C:/Windows/Prefetch  with the name of the application and a file extension (.pf).
The Prefetch feature The file contains among other items the last time that the file was modified as a 64bit HEX value time, and increments an integer on how many times the application has been run.  Analyze Prefetch – Mount Image Pro (MIP) + read-only image + WFA.exe Demo
Mining Prefetch – wfa.exe
10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk)  System Restore points
Print Spooler Files On Windows XP, systems you would find these two files in the  C:\Windows\System32\spool\Printers folder. .SPL -   The print job’s spooled data is contained in a spool file. .SHD - The shadow file contains the job settings
PA Spool Viewer – view .shd files Splview.exe - available at  http:// undocprint.printassociates.com This tool allows you to view the metadata of the print job!
EMF Spool viewer – view .spl files EMF Spool Viewer  - available at  http://www.codeproject.com/dotnet/EMFSpoolViewer/EMFSpoolViewer.zip   This tool allows you to view the actual spooled pages!
10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk)  System Restore Points
Mining the Recycle bin The INFO2 file contains records that correspond to each deleted file in the Recycle Bin;  each record contains the record number,  the drive designator,  the timestamp of when the file was moved to the Recycle Bin,  the file size,  file’s original name and full path, in both ASCII and Unicode. Files sent to the Recycle Bin are maintained according to a specific naming convention D<original drive letter of file><#>.<original extension> Demo
10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk)  System Restore Points
Mining Thumbs.db Thumbs.db contains cached thumbnails of the images in a folder. OLE embedded data present in the Thumbs.db file In many cases, the images may have been deleted from the directory but they may still be available in the thumbs.db cache! Tools: Encase Windows File Analyzer Accessdata FTK Demo
10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History File Shortcut files (.lnk)  System Restore Points
Event Logs  Windows event logs provide crucial insight into the happenings in the system Using event logs in conjunction with other forensic avenue such a registry data (Userassist, Muicache, MRU Lists etc.) can help reconstructing the past events on the system.  Three types of event logs: Application System Security
Mining event logs… What the logs can tell u: Unsuccessful logon attempts  Successful Privilege escalation attempts System time was changed Logon time restriction violation  Logon/logoff times Successful/unsuccessful object access   Default Windows security settings is to log nothing at all! Unfortunately, event logs only record the Netbios name and not the IP address! Demo
10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files Shortcut files (.lnk)  System Restore Points
Tracing Internet Activity Internet Browsers leave detailed history on Hard drive which can show all sites visited and all graphics viewed. An individual's web browsing activity often provides investigative leads during most investigations. We can reconstruct an individual’s web browsing activity using sophisticated tools such as Encase, NetAnalysis and WebHistorian The predominant two web browsers encountered during computer related investigations are  Microsoft's Internet Explorer (IE) and  Firefox/Mozilla/Netscape family
Mining Internet Explorer  IE maintains rich logging of a user’s browsing activities which allow for creating a web profile of the suspect.  IE has three separate logging facilities that can be used to reconstruct the suspect’s web browsing activities.  History of visited URLs Cookies Temporary Internet Files In many cases, the web profiling has lead to successful conviction of pedophiles!
Mining Mozilla Firefox Mozilla Firefox stores the Internet activity in the following folder: C:\Documents and Settings\<user name>\Application Data \Mozilla\Firefox\Profiles\<random text>\Cache   There are three types of files in this directory:  A Cache Map File  Three Cache Block Files  Separate Cache Data Files   Demo
10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files Shortcut files (.lnk)   System Restore Points
Mining shortcut files Link files refer to or link to target files which can be applications, directories, documents, or data files. The data contained inside a link file describes the various attributes of the target file. A link file contains: the complete path to the target file  the volume label and volume serial number on which the target file or folder exists  - this can be useful for connecting a file to a unique volume! the file’s size in bytes the MAC time stamps of the target file!!!
Mining shortcut files… Media type (fixed/removable) Working directory MAC address Remote share name May be found in unallocated clusters and swap space May indicate that data was copied to a removable media! Encase link parser EnScript Windows File Analyzer Demo
10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files Shortcut files (.lnk)  System Restore Points
The restore point feature Rp.log is the restore point log file is located within the restore point (RPxx) directory. This restore point log contains   a value indicating the type of the restore point,  a descriptive name for the restore point creation event (i.e, application or device driver installation, application uninstall etc. ) the 64-bit FILETIME object indicating when the restore point was created
The restore point feature Change.log.x files  Record changes to key application files When a change is detected, the original filename is entered into the change.log file along with a sequence number and other necessary information,such as the type of change that occurred (file deletion, change of file attributes, or change of content). Sometimes the entire file may be preserved (Axxxxxx.ext format)! Each change.log.x file consists of a number of change log records Ref: Windows Forensic Analysis by Harlan Carvey
Mining restore points What restore points can tell: Installation or removal of an application Changes to the system time Remnants of deleted/uninstalled applications Remnants of deleted files Evidence of files being accessed in the past Demo
Queries are welcome!

More Related Content

PDF
Stegano Forensics
PPT
Uniform Domain Name Dispute Resolution
PPT
Open source intelligence
PDF
Csc1401 lecture07 -external memory
PPT
Malware forensics
PPTX
Memory forensics
PPTX
seim.pptx
Stegano Forensics
Uniform Domain Name Dispute Resolution
Open source intelligence
Csc1401 lecture07 -external memory
Malware forensics
Memory forensics
seim.pptx

What's hot (20)

PPTX
Denial of service
PPTX
Computer forensics ppt
PPT
Windowsforensics
PPTX
Intrusion detection and prevention system
PPT
Firewalls
PPT
Network security and protocols
PPTX
Introduction to Cyber Forensics Module 1
PDF
Network forensics
PPT
Registry Forensics
PDF
Email Forensics
PPTX
Ntfs and computer forensics
PDF
Windows 7 forensics event logs-dtl-r3
PPTX
CISSP Chapter 1 BCP
PPT
Computer Forensic
PPTX
Windows Registry
PPTX
Malware analysis
PPTX
Presentation on samba server
PDF
Wired and Wireless Network Forensics
PPT
Network forensics1
Denial of service
Computer forensics ppt
Windowsforensics
Intrusion detection and prevention system
Firewalls
Network security and protocols
Introduction to Cyber Forensics Module 1
Network forensics
Registry Forensics
Email Forensics
Ntfs and computer forensics
Windows 7 forensics event logs-dtl-r3
CISSP Chapter 1 BCP
Computer Forensic
Windows Registry
Malware analysis
Presentation on samba server
Wired and Wireless Network Forensics
Network forensics1
Ad

Viewers also liked (9)

PPTX
Digital forensics research: The next 10 years
PPT
Digital Forensics
PDF
Alphorm.com Support de la Formation Windows 10 Troubleshootings partie 1
PPTX
Computer forensics
PPTX
Digital forensics
PPTX
An introduction to Windows 10
PPTX
Windows 10
PPTX
10 Tips for Making Beautiful Slideshow Presentations by www.visuali.se
PDF
Windows 10 in 10 Minutes
Digital forensics research: The next 10 years
Digital Forensics
Alphorm.com Support de la Formation Windows 10 Troubleshootings partie 1
Computer forensics
Digital forensics
An introduction to Windows 10
Windows 10
10 Tips for Making Beautiful Slideshow Presentations by www.visuali.se
Windows 10 in 10 Minutes
Ad

Similar to Chetan-Mining_Digital_Evidence_in_Microsoft_Windows (20)

PDF
AntiForensics - Leveraging OS and File System Artifacts.pdf
PDF
windows-forensics-analysis-v-1.0-4_2.pdf
PPT
Vista Forensics
PPTX
Disk forensics for the lazy and the smart
PDF
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
PPTX
Msra 2011 windows7 forensics-troyla
ODT
Operating System Forensics
PPTX
Windows forensic
PPTX
Forensicating windows Artifacts investigation without event logs
PPTX
Windows Forensics
PPTX
Digital Forensics (compter) lab 2 2023.pptx
PDF
CNIT 121: 11 Analysis Methodology
PDF
Lecture-1-Windows-Artefacts.pdf
PDF
Anti forensics-techniques-for-browsing-artifacts
PDF
2010 2013 sandro suffert memory forensics introdutory work shop - public
PDF
Free Computer Forensic Software's list - by Forensic Control
PDF
MNSEC 2018 - Windows forensics
PPS
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
PDF
12 Investigating Windows Systems (Part 1 of 3
PPTX
3170725_Unit-4.pptx
AntiForensics - Leveraging OS and File System Artifacts.pdf
windows-forensics-analysis-v-1.0-4_2.pdf
Vista Forensics
Disk forensics for the lazy and the smart
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
Msra 2011 windows7 forensics-troyla
Operating System Forensics
Windows forensic
Forensicating windows Artifacts investigation without event logs
Windows Forensics
Digital Forensics (compter) lab 2 2023.pptx
CNIT 121: 11 Analysis Methodology
Lecture-1-Windows-Artefacts.pdf
Anti forensics-techniques-for-browsing-artifacts
2010 2013 sandro suffert memory forensics introdutory work shop - public
Free Computer Forensic Software's list - by Forensic Control
MNSEC 2018 - Windows forensics
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
12 Investigating Windows Systems (Part 1 of 3
3170725_Unit-4.pptx

More from guest66dc5f (20)

PPT
Os Timed Original
PPT
Control your entire house with your iPhone
PPT
Awesome car collection
PPT
Freaky car number plates
PDF
David-FPGA
PPT
Sunil-Hacking_firefox
PDF
Rahul-Analysis_of_Adversarial_Code
PDF
WHITEPAPER-7_years_of_Indian_Cyber_Law
PPT
Rohas-7_years_of_indian_cyber_laws
PDF
David-FPGA
PDF
Shreeraj-Hacking_Web_2
PPT
Dror-Crazy_toaster
PDF
Ajit-Legiment_Techniques
PPT
Varun-Subtle_Security_flaws
PPT
CostofWarinIraq
PDF
NR-golf-sept07
PDF
NR-golf-sept07
PDF
PDF
longisland_golf_07
PDF
GolfLakeCity_002
Os Timed Original
Control your entire house with your iPhone
Awesome car collection
Freaky car number plates
David-FPGA
Sunil-Hacking_firefox
Rahul-Analysis_of_Adversarial_Code
WHITEPAPER-7_years_of_Indian_Cyber_Law
Rohas-7_years_of_indian_cyber_laws
David-FPGA
Shreeraj-Hacking_Web_2
Dror-Crazy_toaster
Ajit-Legiment_Techniques
Varun-Subtle_Security_flaws
CostofWarinIraq
NR-golf-sept07
NR-golf-sept07
longisland_golf_07
GolfLakeCity_002

Recently uploaded (20)

PPTX
The discussion on the Economic in transportation .pptx
PDF
Topic Globalisation and Lifelines of National Economy.pdf
PDF
Understanding University Research Expenditures (1)_compressed.pdf
PDF
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
PPTX
social-studies-subject-for-high-school-globalization.pptx
PDF
caregiving tools.pdf...........................
PPT
E commerce busin and some important issues
DOCX
marketing plan Elkhabiry............docx
PDF
illuminati Uganda brotherhood agent in Kampala call 0756664682,0782561496
PDF
1a In Search of the Numbers ssrn 1488130 Oct 2009.pdf
PDF
discourse-2025-02-building-a-trillion-dollar-dream.pdf
PPTX
Introduction to Managemeng Chapter 1..pptx
PDF
Chapter 9 IFRS Ed-Ed4_2020 Intermediate Accounting
PPTX
Session 3. Time Value of Money.pptx_finance
PDF
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
PDF
Bladex Earnings Call Presentation 2Q2025
PPTX
Antihypertensive_Drugs_Presentation_Poonam_Painkra.pptx
PPTX
Introduction to Essence of Indian traditional knowledge.pptx
PPTX
FL INTRODUCTION TO AGRIBUSINESS CHAPTER 1
PDF
way to join Real illuminati agent 0782561496,0756664682
The discussion on the Economic in transportation .pptx
Topic Globalisation and Lifelines of National Economy.pdf
Understanding University Research Expenditures (1)_compressed.pdf
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
social-studies-subject-for-high-school-globalization.pptx
caregiving tools.pdf...........................
E commerce busin and some important issues
marketing plan Elkhabiry............docx
illuminati Uganda brotherhood agent in Kampala call 0756664682,0782561496
1a In Search of the Numbers ssrn 1488130 Oct 2009.pdf
discourse-2025-02-building-a-trillion-dollar-dream.pdf
Introduction to Managemeng Chapter 1..pptx
Chapter 9 IFRS Ed-Ed4_2020 Intermediate Accounting
Session 3. Time Value of Money.pptx_finance
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
Bladex Earnings Call Presentation 2Q2025
Antihypertensive_Drugs_Presentation_Poonam_Painkra.pptx
Introduction to Essence of Indian traditional knowledge.pptx
FL INTRODUCTION TO AGRIBUSINESS CHAPTER 1
way to join Real illuminati agent 0782561496,0756664682

Chetan-Mining_Digital_Evidence_in_Microsoft_Windows

  • 1. Mining Digital Evidence in Microsoft Windows – Answering Who, When, Why and How?
  • 2. Agenda CSI Computer Crime and Security Survey, 2007 What is Computer Forensics? Laws of computer Forensics 10 Forensics avenues in Windows XP
  • 3. A Quick CSI-FBI 2007 Survey Summary The average annual loss in 2007 - $350,424 Average annual loss in the previous year - $168,000. Not since the 2004 report have average losses been this high! 46% of the overall respondents said that they had suffered a security incident. Almost one-fifth (18 percent) of those respondents who suffered one or more kinds of security incident further said they’d suffered a “ targeted attack ” Financial fraud - the source of the greatest financial losses.
  • 4. CSI Computer Crime and Security Survey Insider abuse of network access or e-mail - the most prevalent security problem – 59% percent of respondents Virus incidents – 52% percent of respondents Dollar Amount Losses Financial Fraud - $21,124,750 Virus (Worms / Spyware) - $8,391,800 Theft of Confidential Data - $5,685,000 Insider abuse of resources - $2,889,700 Total losses for 2007 - $ 66,930,950
  • 5. CSI Computer Crime and Security Survey How many Incidents in the past twelve months?
  • 6. Computer Forensics – the laws First Law of Computer Forensics There is evidence of every action. Harlan Carvey’s Corollary : Once you understand what actions or conditions create or modify an artifact, then the absence of that artifact is itself an artifact.
  • 7. Tip of the “Digital” Iceberg Data as seen by a casual observer using common tools (Explorer Window, cmd shell, web browser etc. ) Data as seen by Forensic Investigators using his sophisticated toolkit. May include deleted data, hidden data, unauthorized information and records of illegal activity!
  • 9. Windows XP – Market Share 92.69% of the people surfing the Web use Windows on PCs Windows XP’s share - 79.32% Windows Vista – 7.38% Source: http://marketshare.hitslink.com
  • 10. 10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk) Restore Point Forensics
  • 11. 10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk) Restore Point Forensics
  • 13. Mining $logfile $Logfile entry in the MFT contains the log of all file system transactions The deletion of a file leaves several entries in $Logfile It is not unusual to find files that are no longer on the disk Also shows that the file was used by the system Encase $logfile parser Enscript
  • 14. Mining NTFS timestamps NTFS has four timestamps: Creation time Last accessed time Last written time Last Modification time Windows 64-Bit Time Stamp It is an 8-byte string (64 bits), its most significant value is 01h, which is located at the far right of the string as it is stored in little endian. The FN and SIA attributes
  • 15. 10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk) System Restore Points
  • 16. Windows Registry Registry files are essentially databases containing information and settings for Hardware Software Users Preferences A registry hive is a group of keys, subkeys, and values in the registry that has a set of supporting files containing backups of its data. In Windows 98, the registry files are named User.dat and System.dat. In Windows Millennium Edition, the registry files are named Classes.dat, User.dat, and System.dat. In Win XP, the registry files are available in C:\windows\system32\config folder
  • 17. Mining Windows Registry Multiple forensic avenues in the registry! System and User-specific settings UserAssist MuiCache MRU Lists ProgramsCache StreamMRU Shellbags Usbstor IE passwords and many more! Demo
  • 18. 10 Forensics avenues in Windows XP NTFS attributes Registry Files Prefetch Files (.pf) Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk) System Restore Points
  • 19. The Prefetch feature Microsoft created a Prefetch cache to improve boot and application launch time. By caching commonly used applications the OS can determine to apportion system resources in anticipation that the user will access the application. When an application is launched the system updates an entry in the path C:/Windows/Prefetch with the name of the application and a file extension (.pf).
  • 20. The Prefetch feature The file contains among other items the last time that the file was modified as a 64bit HEX value time, and increments an integer on how many times the application has been run. Analyze Prefetch – Mount Image Pro (MIP) + read-only image + WFA.exe Demo
  • 22. 10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk) System Restore points
  • 23. Print Spooler Files On Windows XP, systems you would find these two files in the C:\Windows\System32\spool\Printers folder. .SPL -   The print job’s spooled data is contained in a spool file. .SHD - The shadow file contains the job settings
  • 24. PA Spool Viewer – view .shd files Splview.exe - available at http:// undocprint.printassociates.com This tool allows you to view the metadata of the print job!
  • 25. EMF Spool viewer – view .spl files EMF Spool Viewer  - available at http://www.codeproject.com/dotnet/EMFSpoolViewer/EMFSpoolViewer.zip   This tool allows you to view the actual spooled pages!
  • 26. 10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk) System Restore Points
  • 27. Mining the Recycle bin The INFO2 file contains records that correspond to each deleted file in the Recycle Bin; each record contains the record number, the drive designator, the timestamp of when the file was moved to the Recycle Bin, the file size, file’s original name and full path, in both ASCII and Unicode. Files sent to the Recycle Bin are maintained according to a specific naming convention D<original drive letter of file><#>.<original extension> Demo
  • 28. 10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files (.dat) Shortcut files (.lnk) System Restore Points
  • 29. Mining Thumbs.db Thumbs.db contains cached thumbnails of the images in a folder. OLE embedded data present in the Thumbs.db file In many cases, the images may have been deleted from the directory but they may still be available in the thumbs.db cache! Tools: Encase Windows File Analyzer Accessdata FTK Demo
  • 30. 10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History File Shortcut files (.lnk) System Restore Points
  • 31. Event Logs Windows event logs provide crucial insight into the happenings in the system Using event logs in conjunction with other forensic avenue such a registry data (Userassist, Muicache, MRU Lists etc.) can help reconstructing the past events on the system. Three types of event logs: Application System Security
  • 32. Mining event logs… What the logs can tell u: Unsuccessful logon attempts Successful Privilege escalation attempts System time was changed Logon time restriction violation Logon/logoff times Successful/unsuccessful object access Default Windows security settings is to log nothing at all! Unfortunately, event logs only record the Netbios name and not the IP address! Demo
  • 33. 10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files Shortcut files (.lnk) System Restore Points
  • 34. Tracing Internet Activity Internet Browsers leave detailed history on Hard drive which can show all sites visited and all graphics viewed. An individual's web browsing activity often provides investigative leads during most investigations. We can reconstruct an individual’s web browsing activity using sophisticated tools such as Encase, NetAnalysis and WebHistorian The predominant two web browsers encountered during computer related investigations are Microsoft's Internet Explorer (IE) and Firefox/Mozilla/Netscape family
  • 35. Mining Internet Explorer IE maintains rich logging of a user’s browsing activities which allow for creating a web profile of the suspect. IE has three separate logging facilities that can be used to reconstruct the suspect’s web browsing activities. History of visited URLs Cookies Temporary Internet Files In many cases, the web profiling has lead to successful conviction of pedophiles!
  • 36. Mining Mozilla Firefox Mozilla Firefox stores the Internet activity in the following folder: C:\Documents and Settings\<user name>\Application Data \Mozilla\Firefox\Profiles\<random text>\Cache There are three types of files in this directory: A Cache Map File Three Cache Block Files Separate Cache Data Files Demo
  • 37. 10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files Shortcut files (.lnk) System Restore Points
  • 38. Mining shortcut files Link files refer to or link to target files which can be applications, directories, documents, or data files. The data contained inside a link file describes the various attributes of the target file. A link file contains: the complete path to the target file the volume label and volume serial number on which the target file or folder exists - this can be useful for connecting a file to a unique volume! the file’s size in bytes the MAC time stamps of the target file!!!
  • 39. Mining shortcut files… Media type (fixed/removable) Working directory MAC address Remote share name May be found in unallocated clusters and swap space May indicate that data was copied to a removable media! Encase link parser EnScript Windows File Analyzer Demo
  • 40. 10 Forensics avenues in Windows XP NTFS attributes Registry Files PreFetch Files (.pf) Print Spooler Files Recycle Bin info2 records Thumbs.db Event Logs (.evt) Internet History Files Shortcut files (.lnk) System Restore Points
  • 41. The restore point feature Rp.log is the restore point log file is located within the restore point (RPxx) directory. This restore point log contains a value indicating the type of the restore point, a descriptive name for the restore point creation event (i.e, application or device driver installation, application uninstall etc. ) the 64-bit FILETIME object indicating when the restore point was created
  • 42. The restore point feature Change.log.x files Record changes to key application files When a change is detected, the original filename is entered into the change.log file along with a sequence number and other necessary information,such as the type of change that occurred (file deletion, change of file attributes, or change of content). Sometimes the entire file may be preserved (Axxxxxx.ext format)! Each change.log.x file consists of a number of change log records Ref: Windows Forensic Analysis by Harlan Carvey
  • 43. Mining restore points What restore points can tell: Installation or removal of an application Changes to the system time Remnants of deleted/uninstalled applications Remnants of deleted files Evidence of files being accessed in the past Demo