SlideShare a Scribd company logo
College of Technological Innovation
MSIT 10, CIT 530 Cyber Forensics
Lab 5:
File Structure Analysis & Examine the Windows Registry
Supervised by:
Dr. Farkhund Iqbal Ms. Mona Bader
Prepared by:
Musaab Hasan Zayed Balbahaith Abdulrahman Sabbagh
M80006988@zu.ac.ae M80007225@zu.ac.ae M80007043@zu.ac.ae
September 28, 2016
List of Figures
Figure 1: A file was created on the flash disk with the following paragraph......3
Figure 2: WinHex used to open the flash disk..................................................................3
Figure 3: A "Security" word searched on the flash disk...............................................4
Figure 4: the display result for the searched word........................................................4
Figure 5: the text file was deleted..........................................................................................5
Figure 6: A "Security" word searched on the flash disk after deleted....................5
Figure 7: the display result for the searched word after deleting the file...........6
Figure 8: a Quick format have been applied on the flash disk...................................6
Figure 9: A "Security" word searched on the flash disk after a quick format
applied...............................................................................................................................................7
Figure 10: a full format have been applied on the flash disk.....................................7
Figure 11: A "Security" word searched on the flash disk after a full format
applied...............................................................................................................................................8
Figure 12: A "security" word was not found.....................................................................8
Figure 13: finding the repeating pattern of F6.................................................................9
Figure 14: the second appearance of the pattern F6....................................................9
Figure 15: A search on the acquired image of windows 98 have been applied
............................................................................................................................................................ 10
Figure 16: Content search applied for the system.dat & user.dat......................... 10
............................................................................................Figure 17: Registry files extracted
............................................................................................................................................................ 11
Figure 18: finding the key word "superior" and searching for whole
occurrence .................................................................................................................................... 11
Figure 19: Copying the Key Name for the key word "superior" in text file....... 12
Figure 20: finding the key word "superior" & “denise” and searching for
whole occurrence and copying the Key in text file Name........................................ 12
Figure 21: Deleting the redundant folder names and saving the final file........ 13
Executive Summary
On the first part a located data on a disk was investigated using WinHex regardless of how the operating
system render it. A few scenarios have been applied to test the existence of the file using different
methods. On the second part a windows registry have been used to extract System.dat & User.dat on
the image file and searching on those files for specific information then copy the registry path to a text
file.
Part 1 : File Structure Analysis
Phase1 : setup
Figure 1: A file was created on the flash disk with the following paragraph.
Phase2 : Opening and searching the flash disk
Figure 2: WinHex used to open the flash disk
Figure 3: A "Security" word searched on the flash disk
Figure 4: the display result for the searched word
Result 1: the word was found on the flash disk since the file already existed
on the flash and wasn’t deleted.
Phase3 : Opening and searching the flash disk after a delete
Figure 5: the text file was deleted
Figure 6: A "Security" word searched on the flash disk after deleted
Figure 7: the display result for the searched word after deleting the file
Result 2: the word was found on the flash disk after deleting the file since the
file still on the original place except it is not readily viewable or accessible.
Phase4 : Opening and searching the flash disk after a Quick format
Figure 8: a Quick format have been applied on the flash disk
Figure 9: A "Security" word searched on the flash disk after a quick format applied
Result 3: the word was found on the flash disk after applying a quick format
since it’s not checking the bad sector and the volume of the drive can be re-
built to gain access to the deleted files again.
Phase5 : Opening and searching the flash disk after a full format
Figure 10: a full format have been applied on the flash disk
Figure 11: A "Security" word searched on the flash disk after a full format applied
Figure 12: A "security" word was not found
Result 4: the word was not found on the flash disk after applying a full format
since its checks the bad sectors also on the disk.
Figure 13: finding the repeating pattern of F6
Figure 14: the second appearance of the pattern F6
Part2 : Examine the Windows Registry
Figure 15: A search on the acquired image of windows 98 have been applied
Figure 16: Content search applied for the system.dat & user.dat
Figure 17: Registry files extracted
Figure 18: finding the key word "superior" and searching for whole occurrence
Figure 19: Copying the Key Name for the key word "superior" in text file
Figure 20: finding the key word "superior" & “denise” and searching for whole occurrence and copying the Key
in text file Name
Figure 21:

More Related Content

PPTX
Backup and restore 1
PPTX
Install SharePoint 2010 on Windows 7 VHD Boot
PDF
Coc 4 backup and restore
DOCX
Windows 11 onedrive
DOC
Tricks N Tips By Ravish Roshan
DOCX
Windows 11 backup and restore
DOCX
Batch File Virus Project Technical Paper
DOCX
Windows 11 storage spaces
Backup and restore 1
Install SharePoint 2010 on Windows 7 VHD Boot
Coc 4 backup and restore
Windows 11 onedrive
Tricks N Tips By Ravish Roshan
Windows 11 backup and restore
Batch File Virus Project Technical Paper
Windows 11 storage spaces

What's hot (9)

DOC
Hosts setup
PPTX
Windows 10 Data Recovery
PPTX
General Knowledge
PPTX
Microsoft Windows 10 Professional
PPT
Guide to Windows 7 - Managing Disks
PPTX
Comodo presentation
PPTX
Windows 8
PPT
Windows 7
PDF
My Teacher Got IT v2.0 - Software Installation Track
Hosts setup
Windows 10 Data Recovery
General Knowledge
Microsoft Windows 10 Professional
Guide to Windows 7 - Managing Disks
Comodo presentation
Windows 8
Windows 7
My Teacher Got IT v2.0 - Software Installation Track
Ad

Similar to Cyber forensics Lab (20)

PPT
Windowsforensics
PPTX
3170725_Unit-4.pptx
PDF
FINDING FORENSIC ARTIFACTS FROM WINDOW REGISTRY
PDF
CS6004 Cyber Forensics - UNIT V
PPT
Computer Forensics Analysis and Validation.ppt
PDF
Reverse engineering-microsoft-exfat-file-system 33274
PPT
Registry forensics
PPSX
File system security
PPT
Unit 3 chapter-1managing-files-of-records
DOCX
Digital Forensic Examination Summary Report(for ALL lab assignme.docx
PPTX
Introduction to File System
PDF
File000162
PDF
In-depth forensic analysis of Windows registry files
PPS
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
PPT
Windows Forensics- Introduction and Analysis
PPTX
Windows Registry analysis with RegRipper
PPTX
First Responder Course - Session 10 - Static Evidence Collection [2004]
PPTX
Windows File Systems
PPTX
Computer forensics libin
Windowsforensics
3170725_Unit-4.pptx
FINDING FORENSIC ARTIFACTS FROM WINDOW REGISTRY
CS6004 Cyber Forensics - UNIT V
Computer Forensics Analysis and Validation.ppt
Reverse engineering-microsoft-exfat-file-system 33274
Registry forensics
File system security
Unit 3 chapter-1managing-files-of-records
Digital Forensic Examination Summary Report(for ALL lab assignme.docx
Introduction to File System
File000162
In-depth forensic analysis of Windows registry files
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Windows Forensics- Introduction and Analysis
Windows Registry analysis with RegRipper
First Responder Course - Session 10 - Static Evidence Collection [2004]
Windows File Systems
Computer forensics libin
Ad

More from MUSAAB HASAN (14)

PDF
Communication & switching networks lab manual
PPTX
Instruction manual for E Archiving
PPTX
Instruction manual for E Archiving
PDF
A Security Study for Smart Metering Systems
PDF
Engineering design via autocad
PDF
Android Applications development Using APP inventor
PDF
Engineering Design vis Microsoft Visio
PDF
Microcontrollers programming Raspberry Pi
PDF
Using PCB wizard for PCB implementation
PDF
PC techniques software and Hardware
PDF
Datasheets & Searching information
PDF
Lab 1 Bag & Tag (cyber forensics)
PDF
Cyber forensics lab 4
PDF
2016 ieee uae_student_day_sep_description_aau-dec-01-2015
Communication & switching networks lab manual
Instruction manual for E Archiving
Instruction manual for E Archiving
A Security Study for Smart Metering Systems
Engineering design via autocad
Android Applications development Using APP inventor
Engineering Design vis Microsoft Visio
Microcontrollers programming Raspberry Pi
Using PCB wizard for PCB implementation
PC techniques software and Hardware
Datasheets & Searching information
Lab 1 Bag & Tag (cyber forensics)
Cyber forensics lab 4
2016 ieee uae_student_day_sep_description_aau-dec-01-2015

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Cloud computing and distributed systems.
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Machine Learning_overview_presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Encapsulation theory and applications.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Programs and apps: productivity, graphics, security and other tools
Reach Out and Touch Someone: Haptics and Empathic Computing
Cloud computing and distributed systems.
Unlocking AI with Model Context Protocol (MCP)
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
Machine Learning_overview_presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Encapsulation theory and applications.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?

Cyber forensics Lab

  • 1. College of Technological Innovation MSIT 10, CIT 530 Cyber Forensics Lab 5: File Structure Analysis & Examine the Windows Registry Supervised by: Dr. Farkhund Iqbal Ms. Mona Bader Prepared by: Musaab Hasan Zayed Balbahaith Abdulrahman Sabbagh M80006988@zu.ac.ae M80007225@zu.ac.ae M80007043@zu.ac.ae September 28, 2016
  • 2. List of Figures Figure 1: A file was created on the flash disk with the following paragraph......3 Figure 2: WinHex used to open the flash disk..................................................................3 Figure 3: A "Security" word searched on the flash disk...............................................4 Figure 4: the display result for the searched word........................................................4 Figure 5: the text file was deleted..........................................................................................5 Figure 6: A "Security" word searched on the flash disk after deleted....................5 Figure 7: the display result for the searched word after deleting the file...........6 Figure 8: a Quick format have been applied on the flash disk...................................6 Figure 9: A "Security" word searched on the flash disk after a quick format applied...............................................................................................................................................7 Figure 10: a full format have been applied on the flash disk.....................................7 Figure 11: A "Security" word searched on the flash disk after a full format applied...............................................................................................................................................8 Figure 12: A "security" word was not found.....................................................................8 Figure 13: finding the repeating pattern of F6.................................................................9 Figure 14: the second appearance of the pattern F6....................................................9 Figure 15: A search on the acquired image of windows 98 have been applied ............................................................................................................................................................ 10 Figure 16: Content search applied for the system.dat & user.dat......................... 10 ............................................................................................Figure 17: Registry files extracted ............................................................................................................................................................ 11 Figure 18: finding the key word "superior" and searching for whole occurrence .................................................................................................................................... 11 Figure 19: Copying the Key Name for the key word "superior" in text file....... 12 Figure 20: finding the key word "superior" & “denise” and searching for whole occurrence and copying the Key in text file Name........................................ 12 Figure 21: Deleting the redundant folder names and saving the final file........ 13
  • 3. Executive Summary On the first part a located data on a disk was investigated using WinHex regardless of how the operating system render it. A few scenarios have been applied to test the existence of the file using different methods. On the second part a windows registry have been used to extract System.dat & User.dat on the image file and searching on those files for specific information then copy the registry path to a text file. Part 1 : File Structure Analysis Phase1 : setup Figure 1: A file was created on the flash disk with the following paragraph. Phase2 : Opening and searching the flash disk Figure 2: WinHex used to open the flash disk
  • 4. Figure 3: A "Security" word searched on the flash disk Figure 4: the display result for the searched word Result 1: the word was found on the flash disk since the file already existed on the flash and wasn’t deleted.
  • 5. Phase3 : Opening and searching the flash disk after a delete Figure 5: the text file was deleted Figure 6: A "Security" word searched on the flash disk after deleted
  • 6. Figure 7: the display result for the searched word after deleting the file Result 2: the word was found on the flash disk after deleting the file since the file still on the original place except it is not readily viewable or accessible. Phase4 : Opening and searching the flash disk after a Quick format Figure 8: a Quick format have been applied on the flash disk
  • 7. Figure 9: A "Security" word searched on the flash disk after a quick format applied Result 3: the word was found on the flash disk after applying a quick format since it’s not checking the bad sector and the volume of the drive can be re- built to gain access to the deleted files again. Phase5 : Opening and searching the flash disk after a full format Figure 10: a full format have been applied on the flash disk
  • 8. Figure 11: A "Security" word searched on the flash disk after a full format applied Figure 12: A "security" word was not found Result 4: the word was not found on the flash disk after applying a full format since its checks the bad sectors also on the disk.
  • 9. Figure 13: finding the repeating pattern of F6 Figure 14: the second appearance of the pattern F6
  • 10. Part2 : Examine the Windows Registry Figure 15: A search on the acquired image of windows 98 have been applied Figure 16: Content search applied for the system.dat & user.dat
  • 11. Figure 17: Registry files extracted Figure 18: finding the key word "superior" and searching for whole occurrence
  • 12. Figure 19: Copying the Key Name for the key word "superior" in text file Figure 20: finding the key word "superior" & “denise” and searching for whole occurrence and copying the Key in text file Name