SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Operating system Forensics
Importance of operating system forensics
• Ultimately, in a forensic examination, we are investigating the action of a Person
• Almost every event or action on a system is the result of a user either doing something
• Many events change the state of the Operating System (OS)
• OS Forensics helps understand how system changes correlate to events resulting from the
action of somebody in the real world
Goal: Extract and interpret data of investigative value from computers running Windows operating
systems
There are many versions of windows out there:
Some of the older versions are outdated and are no longer used: Windows 9x, NT, ME, 2000, XP
Windows boot sequence
Windows startup: Why relevant for forensics?
1. Interrupt the boot process to view and document the CMOS configuration
2. Explain which files were altered in the startup process
E.g., if an evidentiary system was accidentally booted, demonstrate that no user-created files were
modified
3. Determine which version of the OS was running and when was installed
4. Examine the startup process for signs of tampering
E.g., important when investigating malware
Startup in Windows NT and later
All NTFS computers perform the following steps when the computer is turned on:
Contamination concerns with Windows:
• When you start a Windows XP NTFS workstation, several files are accessed immediately
The last access date and time stamp for the files change to the current date and time.
• May destroy any potential evidence.
E.g., that shows when a Windows workstation was last used.
• Determining which files are changed upon startup and shutdown can be done using some
forensic tools.
Relevant Windows data structures:
NTFS
Windows Registry
Windows Event Log
Windows Registry:
The Registry is the heart and soul of Windows OSes and a wealth of information can be recovered:
• System configuration
• Devices on the system
• User names
• Personal settings and browser preferences
• Web browsing activity
• Files opened
• Programs executed
• Passwords
Registry access activity
• Virtually everything done in Windows refers to or is recorded into the Registry
The RegMon program can be used to display registry activity in real time
• Registry access barely remains idle: the registry is referenced in one way or another with
every action taken by the user
Windows Event Log
Whenever an event, such as a user logging on or off, occurs, the operating system logs the event.
An event can be any occurrence that the OS or a program wants to keep track of or alert the user
about.
Windows has a centralized log service to allow apps and OS to report events that have taken place:
• Application (example: Database message)
• System (example: driver failure)
• Security (example: Logon attempt, file access)
Example of detailed event tracking:
Detailed Event tracking can include the following events:
#528 – Successful Login (The user authenticate to the system)
#592 – A new process has been created (application is launched)
#560 – Object Open (a file is requested)
#567 – Object Access (the file is modified and saved)
#564 – Object Deleted
#562 – Handle Closed (the file has been closed)
#593 – A Process Has Exited (the application was terminated)
Windows artifacts of user activities:
Volatile information
• Open network connections
• Running processes
Non-volatile information
• Hidden files
• Slack space
• Swap files
• Index.dat files
• Windows Search index
• Unallocated clusters
• Unused partitions
• Hidden partitions
• Registry settings
• Windows event logs
Operating System Forensics Tool:
PassMark OSForensics:
PassMark OSForensics allows you to identify suspicious files and activity with hash matching,
drive signature comparisons, e-mails, memory and binary data.
It lets you extract forensic evidence from computers quickly with advanced file searching and
indexing and enables this data to be managed effectively.
Features
Discover Forensic Evidence Faster
• Find files faster, search by filename, size and time
• Search within file contents using the Zoom search engine
• Search through email archives from Outlook, ThunderBird, Mozilla and more
• Recover and search deleted files
• Uncover recent activity of website visits, downloads and logins
• Collect detailed system information
• Password recovery from web browsers, decryption of office documents
• Discover and reveal hidden areas in your hard disk
• Browse Volume Shadow copies to see past versions of files
Platforms:
Windows XP SP3, Vista, Win 7, Win 8, Win 10, Server 2000, 2003, 2008, 2012. Available for both
32-bit and 64-bit platforms.
Requirements:
Minimum 1GB of RAM. (4GB+ recommended)
200MB of free disk space, or can be run from USB drive
DEMO:
Scenario:
Artifact: Physical Pendrive (Transcend 8 GB Pendrive)
Software used: PassMark OSForensics
Goal:
1) To extract the image and do live forensics
2) Identify the deleted files and pictures used for committing cyber crime.
Fig1.0, PassMark OSForensics Dashboard
Fig 1.1, Create a New Case
Fig 1.2, Provide Case details and Target location for forensics image.
Fig 1.3, Target location created Successfully.
Fig 1.4, Select the option ‘Deleted File Search’ in the Dashboard.
Fig 1.5, Select the target partition i.e. Transcend Pendrive and click on Search as show in the figure.
Fig 1.6, Current files and folders
available inside the Artifact (Physical
Pendrive).
Fig 1.7,
Identified the
deleted files
and folders in
the Pendrive.
Fig 1.8, Analysing a deleted image file.
Fig 1.9, Analysing a deleted text document file.

More Related Content

PPTX
Windows Forensic 101
PPT
Windowsforensics
PPTX
Computer forensics toolkit
PPT
Mobile forensics
PPTX
Forensic imaging
PDF
Network Forensic
PPTX
Digital Forensics
Windows Forensic 101
Windowsforensics
Computer forensics toolkit
Mobile forensics
Forensic imaging
Network Forensic
Digital Forensics

What's hot (20)

PPTX
Introduction to filesystems and computer forensics
PPTX
Mobile Forensics
PPTX
Autopsy Digital forensics tool
PDF
CNIT 121: 8 Forensic Duplication
PPTX
Memory forensics
PPT
Introduction to computer forensic
PPTX
Computer forensic ppt
PPTX
E mail Investigation
PPTX
L6 Digital Forensic Investigation Tools.pptx
PDF
04 Evidence Collection and Data Seizure - Notes
PPTX
Virtual Machine Forensics
PPT
Digital Forensics
PPTX
Network Forensics
PPT
Network forensics1
PPTX
Handling digital crime scene
PDF
06 Computer Image Verification and Authentication - Notes
PPTX
Memory forensics.pptx
PPTX
Mobile Forensics
PDF
Social Media Forensics
Introduction to filesystems and computer forensics
Mobile Forensics
Autopsy Digital forensics tool
CNIT 121: 8 Forensic Duplication
Memory forensics
Introduction to computer forensic
Computer forensic ppt
E mail Investigation
L6 Digital Forensic Investigation Tools.pptx
04 Evidence Collection and Data Seizure - Notes
Virtual Machine Forensics
Digital Forensics
Network Forensics
Network forensics1
Handling digital crime scene
06 Computer Image Verification and Authentication - Notes
Memory forensics.pptx
Mobile Forensics
Social Media Forensics
Ad

Similar to Operating System Forensics (20)

PPTX
Msra 2011 windows7 forensics-troyla
PDF
windows-forensics-analysis-v-1.0-4_2.pdf
PDF
MNSEC 2018 - Windows forensics
PDF
Debian Linux as a Forensic Workstation
PPS
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
PDF
Digital Forensics
PPT
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
PDF
Práctica de informática forense taller práctico
PDF
Free Computer Forensic Software's list - by Forensic Control
PDF
Lecture-1-Windows-Artefacts.pdf
PDF
2010 2013 sandro suffert memory forensics introdutory work shop - public
PPTX
Computer forensics libin
PPTX
Latest presentation
PPTX
Digital Forensics (compter) lab 2 2023.pptx
PDF
AntiForensics - Leveraging OS and File System Artifacts.pdf
PDF
the Cyber - Forensics - Lab - Manual . pdf
PDF
eForensics_17_2013_KMOKER
PPT
Role of a Forensic Investigator
PPTX
Computer Forensics
PPTX
3170725_Unit-4.pptx
Msra 2011 windows7 forensics-troyla
windows-forensics-analysis-v-1.0-4_2.pdf
MNSEC 2018 - Windows forensics
Debian Linux as a Forensic Workstation
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Digital Forensics
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
Práctica de informática forense taller práctico
Free Computer Forensic Software's list - by Forensic Control
Lecture-1-Windows-Artefacts.pdf
2010 2013 sandro suffert memory forensics introdutory work shop - public
Computer forensics libin
Latest presentation
Digital Forensics (compter) lab 2 2023.pptx
AntiForensics - Leveraging OS and File System Artifacts.pdf
the Cyber - Forensics - Lab - Manual . pdf
eForensics_17_2013_KMOKER
Role of a Forensic Investigator
Computer Forensics
3170725_Unit-4.pptx
Ad

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Big Data Technologies - Introduction.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
cuic standard and advanced reporting.pdf
sap open course for s4hana steps from ECC to s4
Big Data Technologies - Introduction.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
Programs and apps: productivity, graphics, security and other tools
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
NewMind AI Weekly Chronicles - August'25 Week I
Agricultural_Statistics_at_a_Glance_2022_0.pdf
cuic standard and advanced reporting.pdf

Operating System Forensics

  • 1. Operating system Forensics Importance of operating system forensics • Ultimately, in a forensic examination, we are investigating the action of a Person • Almost every event or action on a system is the result of a user either doing something • Many events change the state of the Operating System (OS) • OS Forensics helps understand how system changes correlate to events resulting from the action of somebody in the real world Goal: Extract and interpret data of investigative value from computers running Windows operating systems There are many versions of windows out there: Some of the older versions are outdated and are no longer used: Windows 9x, NT, ME, 2000, XP Windows boot sequence Windows startup: Why relevant for forensics? 1. Interrupt the boot process to view and document the CMOS configuration 2. Explain which files were altered in the startup process E.g., if an evidentiary system was accidentally booted, demonstrate that no user-created files were modified 3. Determine which version of the OS was running and when was installed 4. Examine the startup process for signs of tampering E.g., important when investigating malware Startup in Windows NT and later All NTFS computers perform the following steps when the computer is turned on:
  • 2. Contamination concerns with Windows: • When you start a Windows XP NTFS workstation, several files are accessed immediately The last access date and time stamp for the files change to the current date and time. • May destroy any potential evidence. E.g., that shows when a Windows workstation was last used. • Determining which files are changed upon startup and shutdown can be done using some forensic tools. Relevant Windows data structures: NTFS Windows Registry Windows Event Log Windows Registry: The Registry is the heart and soul of Windows OSes and a wealth of information can be recovered: • System configuration • Devices on the system • User names • Personal settings and browser preferences • Web browsing activity • Files opened • Programs executed • Passwords Registry access activity • Virtually everything done in Windows refers to or is recorded into the Registry The RegMon program can be used to display registry activity in real time
  • 3. • Registry access barely remains idle: the registry is referenced in one way or another with every action taken by the user Windows Event Log Whenever an event, such as a user logging on or off, occurs, the operating system logs the event. An event can be any occurrence that the OS or a program wants to keep track of or alert the user about. Windows has a centralized log service to allow apps and OS to report events that have taken place: • Application (example: Database message) • System (example: driver failure) • Security (example: Logon attempt, file access) Example of detailed event tracking: Detailed Event tracking can include the following events: #528 – Successful Login (The user authenticate to the system) #592 – A new process has been created (application is launched) #560 – Object Open (a file is requested) #567 – Object Access (the file is modified and saved) #564 – Object Deleted #562 – Handle Closed (the file has been closed) #593 – A Process Has Exited (the application was terminated) Windows artifacts of user activities: Volatile information • Open network connections • Running processes Non-volatile information • Hidden files • Slack space • Swap files • Index.dat files • Windows Search index • Unallocated clusters • Unused partitions • Hidden partitions • Registry settings • Windows event logs
  • 4. Operating System Forensics Tool: PassMark OSForensics: PassMark OSForensics allows you to identify suspicious files and activity with hash matching, drive signature comparisons, e-mails, memory and binary data. It lets you extract forensic evidence from computers quickly with advanced file searching and indexing and enables this data to be managed effectively. Features Discover Forensic Evidence Faster • Find files faster, search by filename, size and time • Search within file contents using the Zoom search engine • Search through email archives from Outlook, ThunderBird, Mozilla and more • Recover and search deleted files • Uncover recent activity of website visits, downloads and logins • Collect detailed system information • Password recovery from web browsers, decryption of office documents • Discover and reveal hidden areas in your hard disk • Browse Volume Shadow copies to see past versions of files Platforms: Windows XP SP3, Vista, Win 7, Win 8, Win 10, Server 2000, 2003, 2008, 2012. Available for both 32-bit and 64-bit platforms. Requirements: Minimum 1GB of RAM. (4GB+ recommended) 200MB of free disk space, or can be run from USB drive DEMO: Scenario: Artifact: Physical Pendrive (Transcend 8 GB Pendrive) Software used: PassMark OSForensics Goal: 1) To extract the image and do live forensics 2) Identify the deleted files and pictures used for committing cyber crime.
  • 6. Fig 1.1, Create a New Case
  • 7. Fig 1.2, Provide Case details and Target location for forensics image.
  • 8. Fig 1.3, Target location created Successfully. Fig 1.4, Select the option ‘Deleted File Search’ in the Dashboard.
  • 9. Fig 1.5, Select the target partition i.e. Transcend Pendrive and click on Search as show in the figure. Fig 1.6, Current files and folders available inside the Artifact (Physical Pendrive). Fig 1.7, Identified the deleted files and folders in the Pendrive.
  • 10. Fig 1.8, Analysing a deleted image file. Fig 1.9, Analysing a deleted text document file.