SlideShare a Scribd company logo
Registry Forensics Prepared By : SOMESH SAWHNEY MOMENTUM INFOCARE PVT. LTD.
Registry Definition The Microsoft Computer Dictionary defines the registry as: A central hierarchical database used in the Microsoft Windows family of Operating Systems to store information necessary to configure the system for one or more users, applications and hardware devices. The registry contains information that Windows continually references during operation, such as profiles for each user, the applications installed on the computer and the types of documents that each can create, property sheet settings for folders and application icons, what hardware exists on the system and the ports that are being used.
What is the Registry? Windows Registry is a central database in Windows. The database contains most of the "pointers" and "settings" for Windows, programs, hardware and  users. Pointers tell Windows or programs where to find the resources required  to perform specific actions.  Just about any setting that you change -- either in Windows or a program –  changes the registry. There are some notable exceptions. Firefox, Thunderbird  and many other "wiser" programs avoid the Registry entirely by saving settings, etc. in their own file folders. Almost any time you are using your PC there are a swarm of things going on behind the scenes in the Registry, almost like bees around a hive. (In fact, that’s why the major elements of the Registry are called hives.) You can observe these with  Regmon .
Why We Need Registry? The System Registry is also where malware "registers"  itself to run on the system, or makes other modifications that can have a critical impact on the functioning of your PC.  Thus, familiarizing yourself with the System Registry is not just a good way to tweak your PC, it's essential if you wish to be able to manually defend it.
Registry: A Wealth of Information Information that can be recovered include: System Configuration Devices on the System User Names Personal Settings and Browser Preferences Web Browsing Activity Programs Executed Files Opened
How It Looks Like ?  Top tier items are folders known as keys which, when expanded, display various second tier items, also known as keys. Additional third-tier keys may also be contained within second tier keys, etc In other words, just as Windows has folders and subfolders, the registry has keys and subkeys. Within those keys are values.  To see the values a particular key contains, you first select (highlight) the key in the left pane, and the value(s) will appear in the right pane.
Registry Organization Root Keys  HKEY_CLASSES_ROOT (HKCR)  Contains information in order that the correct program opens when executing a file with Windows Explorer. HKEY_CURRENT_USER (HKCU)  Contains the profile (settings, etc) about the user that is logged in.  HKEY_LOCAL_MACHINE (HKLM)  Contains system-wide hardware settings and configuration information. HKEY_USERS (HKU)  Contains the root of all user profiles that exist on the system. Contains computer-specific information about the type of hardware installed, software settings, and other information. This information is used for all users who log on to this computer. Contains information about all the users who log on to the computer, including both generic and user-specific information. The generic settings are available to all users who log on to the computer. The information is made up of default settings for applications, desktop configurations, and so HKEY_CURRENT_CONFIG (HKCC) Contains information about the hardware profile used by the computer during start up.
Backing up the Windows  registry Microsoft Windows includes a new feature known as  system restore . This great new feature enables a user to backup and restore their important system files from an earlier day. By default this feature automatically creates a backup of the system each day. If you wish to create a restore point of your system follow the below steps. Click Start, Programs, Accessories, System Tools, System Restore Select the option to Create a restore point Click next and follow the remainder steps.
Five primary data types in a Registry. Here are the five primary data types in a Registry. REG_SZ (string value) -- numbers and text REG_MULTI_SZ (string array value) -- numbers and text you can edit but not create REG_EXPAND_SZ (expanded string value) -- usually points to the location of files REG_BINARY (binary values) -- binary data REG_DWORD (DWORD values) -- a hexadecimal data type
How to disable USB storage devices from a computers in the network.  Go to -: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor\Start And set its value to 3-(Enable) , 4 (Disable) It only works if the USB storage driver is already installed. If it has not yet been installed, Windows' plug & play subsystem automatically resets the Start value to 3 (Manual) when it installs USBSTOR after a USB storage device is plugged in for the first time.
Disable Internet Access   (All Windows) Open your  registry  and find the key below. [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]  Change the value of "ProxyEnable" and set it to "1". Change the value of "ProxyServer" and set it to an IP address and port that is invalid on your network such as "10.0.0.1:5555" (i.e. "IP:Port").  By changing these settings Internet access will be disabled for any applications that rely of the Microsoft proxy server information such as Internet Explorer, Microsoft Office, Opera browser.  To stop users from modifying the proxy settings add these restrictions to disable changes to the Internet configuration.  Find or create the key below:  [HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel]  Create two DWORD values named "Connection Settings" and "Connwiz Admin Lock" and set them both to "1".  To remove the restriction, set the proxy settings back to their original values and delete the policy values.
Restrict Applications Users Can Run (All Windows)   Open your  registry  and find the key [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer] Create a new DWORD value and name it "RestrictRun" set the value to "1" to enable application restrictions or "0" to allow all applications to run.  Then create a new sub-key called [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer\RestrictRun] and define the applications that are allowed. Creating a new string value for each application, named as consecutive numbers, and setting the value to the filename to be allowed (e.g. "regedit.exe").  Restart Windows for the changes to take effect.
THANKS A LOT FOR YOUR  CO-OPERATION

More Related Content

PPTX
Windows registry forensics
PPTX
Windows Registry
PPT
Registry forensics
PPT
Windows forensic artifacts
PDF
Cloud-forensics
PPTX
Windows Forensic 101
PPT
Linux forensics
Windows registry forensics
Windows Registry
Registry forensics
Windows forensic artifacts
Cloud-forensics
Windows Forensic 101
Linux forensics

What's hot (20)

PDF
Forensics of a Windows System
PPT
Windowsforensics
PPTX
Introduction to filesystems and computer forensics
PPTX
Windows forensic
PPT
Data loss prevention (dlp)
PPTX
Module 02 ftk imager
PDF
LTEC 2013 - EnCase v7.08.01 presentation
PPTX
Memory forensics
PDF
Encase V7 Presented by Guidance Software august 2011
PPTX
Siem ppt
PDF
CNIT 121: 8 Forensic Duplication
PPTX
Ntfs and computer forensics
PDF
SentinelOne - NOAH19 Tel Aviv
PPTX
Autopsy Digital forensics tool
PPTX
MITRE ATT&CK framework
PPTX
Basic malware analysis
PPTX
Open vas
PPTX
Mobile Forensics
PDF
Accessing Forensic Images
PPTX
Introduction to NIST’s Risk Management Framework (RMF)
Forensics of a Windows System
Windowsforensics
Introduction to filesystems and computer forensics
Windows forensic
Data loss prevention (dlp)
Module 02 ftk imager
LTEC 2013 - EnCase v7.08.01 presentation
Memory forensics
Encase V7 Presented by Guidance Software august 2011
Siem ppt
CNIT 121: 8 Forensic Duplication
Ntfs and computer forensics
SentinelOne - NOAH19 Tel Aviv
Autopsy Digital forensics tool
MITRE ATT&CK framework
Basic malware analysis
Open vas
Mobile Forensics
Accessing Forensic Images
Introduction to NIST’s Risk Management Framework (RMF)
Ad

Viewers also liked (13)

PDF
Windows Registry Analysis
PPTX
Windows Registry Forensics with Volatility Framework
PPT
Computer Forensics & Windows Registry
PPT
Computer Forensics & Windows Registry
PPTX
La responsabilité du chef d'entreprise face à une fuite de données
PDF
Windows 8.x Forensics 1.0
PDF
Windows 7 forensics event logs-dtl-r3
PDF
Windows 7 forensics -overview-r3
PPTX
Windows 8 Forensics & Anti Forensics
PPTX
Open Source Forensics
PDF
File000124
PDF
File000125
PPTX
Windows 10 Forensics: OS Evidentiary Artefacts
Windows Registry Analysis
Windows Registry Forensics with Volatility Framework
Computer Forensics & Windows Registry
Computer Forensics & Windows Registry
La responsabilité du chef d'entreprise face à une fuite de données
Windows 8.x Forensics 1.0
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics -overview-r3
Windows 8 Forensics & Anti Forensics
Open Source Forensics
File000124
File000125
Windows 10 Forensics: OS Evidentiary Artefacts
Ad

Similar to Registry Forensics (20)

PPTX
Windows Registry Forensics - Artifacts
PDF
Windows registry troubleshooting (2015)
PPT
Seminar Topic Registry (M.Tech)
PDF
FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION
DOCX
10 resource kit remote administration tools
PPSX
Desktop and server securityse
PPSX
Desktop and Server Security
PDF
Windows 2000 Registry Little Black Book Nathan Wallace Anthony Sequeira
PPTX
Computer softwre
PPT
Intrusion Discovery on Windows
PPT
Windows xp and registery
PDF
How to remove conduit search and other toolbars — extended guide
PPT
Operatig System Tutorial Level3
PPT
Ch07 system administration
PPT
Latihan8 comp-forensic-bab5
PDF
Unit 5.2 Device Driver.pdf (Device Driver)
PDF
System software vt
PPTX
DBSAT-–-Oracle-Database-Security-Assessment-Tool.pptx
PPTX
Application software and system software
PPT
WindowsRegistry.ppt
Windows Registry Forensics - Artifacts
Windows registry troubleshooting (2015)
Seminar Topic Registry (M.Tech)
FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION
10 resource kit remote administration tools
Desktop and server securityse
Desktop and Server Security
Windows 2000 Registry Little Black Book Nathan Wallace Anthony Sequeira
Computer softwre
Intrusion Discovery on Windows
Windows xp and registery
How to remove conduit search and other toolbars — extended guide
Operatig System Tutorial Level3
Ch07 system administration
Latihan8 comp-forensic-bab5
Unit 5.2 Device Driver.pdf (Device Driver)
System software vt
DBSAT-–-Oracle-Database-Security-Assessment-Tool.pptx
Application software and system software
WindowsRegistry.ppt

Recently uploaded (20)

PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
project resource management chapter-09.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Tartificialntelligence_presentation.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
project resource management chapter-09.pdf
Getting started with AI Agents and Multi-Agent Systems
A contest of sentiment analysis: k-nearest neighbor versus neural network
Programs and apps: productivity, graphics, security and other tools
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Architecture types and enterprise applications.pdf
Web App vs Mobile App What Should You Build First.pdf
Hybrid model detection and classification of lung cancer
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Assigned Numbers - 2025 - Bluetooth® Document
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
Tartificialntelligence_presentation.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
cloud_computing_Infrastucture_as_cloud_p
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Univ-Connecticut-ChatGPT-Presentaion.pdf
A comparative study of natural language inference in Swahili using monolingua...

Registry Forensics

  • 1. Registry Forensics Prepared By : SOMESH SAWHNEY MOMENTUM INFOCARE PVT. LTD.
  • 2. Registry Definition The Microsoft Computer Dictionary defines the registry as: A central hierarchical database used in the Microsoft Windows family of Operating Systems to store information necessary to configure the system for one or more users, applications and hardware devices. The registry contains information that Windows continually references during operation, such as profiles for each user, the applications installed on the computer and the types of documents that each can create, property sheet settings for folders and application icons, what hardware exists on the system and the ports that are being used.
  • 3. What is the Registry? Windows Registry is a central database in Windows. The database contains most of the "pointers" and "settings" for Windows, programs, hardware and users. Pointers tell Windows or programs where to find the resources required to perform specific actions. Just about any setting that you change -- either in Windows or a program – changes the registry. There are some notable exceptions. Firefox, Thunderbird and many other "wiser" programs avoid the Registry entirely by saving settings, etc. in their own file folders. Almost any time you are using your PC there are a swarm of things going on behind the scenes in the Registry, almost like bees around a hive. (In fact, that’s why the major elements of the Registry are called hives.) You can observe these with Regmon .
  • 4. Why We Need Registry? The System Registry is also where malware "registers" itself to run on the system, or makes other modifications that can have a critical impact on the functioning of your PC. Thus, familiarizing yourself with the System Registry is not just a good way to tweak your PC, it's essential if you wish to be able to manually defend it.
  • 5. Registry: A Wealth of Information Information that can be recovered include: System Configuration Devices on the System User Names Personal Settings and Browser Preferences Web Browsing Activity Programs Executed Files Opened
  • 6. How It Looks Like ? Top tier items are folders known as keys which, when expanded, display various second tier items, also known as keys. Additional third-tier keys may also be contained within second tier keys, etc In other words, just as Windows has folders and subfolders, the registry has keys and subkeys. Within those keys are values. To see the values a particular key contains, you first select (highlight) the key in the left pane, and the value(s) will appear in the right pane.
  • 7. Registry Organization Root Keys HKEY_CLASSES_ROOT (HKCR) Contains information in order that the correct program opens when executing a file with Windows Explorer. HKEY_CURRENT_USER (HKCU) Contains the profile (settings, etc) about the user that is logged in. HKEY_LOCAL_MACHINE (HKLM) Contains system-wide hardware settings and configuration information. HKEY_USERS (HKU) Contains the root of all user profiles that exist on the system. Contains computer-specific information about the type of hardware installed, software settings, and other information. This information is used for all users who log on to this computer. Contains information about all the users who log on to the computer, including both generic and user-specific information. The generic settings are available to all users who log on to the computer. The information is made up of default settings for applications, desktop configurations, and so HKEY_CURRENT_CONFIG (HKCC) Contains information about the hardware profile used by the computer during start up.
  • 8. Backing up the Windows registry Microsoft Windows includes a new feature known as system restore . This great new feature enables a user to backup and restore their important system files from an earlier day. By default this feature automatically creates a backup of the system each day. If you wish to create a restore point of your system follow the below steps. Click Start, Programs, Accessories, System Tools, System Restore Select the option to Create a restore point Click next and follow the remainder steps.
  • 9. Five primary data types in a Registry. Here are the five primary data types in a Registry. REG_SZ (string value) -- numbers and text REG_MULTI_SZ (string array value) -- numbers and text you can edit but not create REG_EXPAND_SZ (expanded string value) -- usually points to the location of files REG_BINARY (binary values) -- binary data REG_DWORD (DWORD values) -- a hexadecimal data type
  • 10. How to disable USB storage devices from a computers in the network. Go to -: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor\Start And set its value to 3-(Enable) , 4 (Disable) It only works if the USB storage driver is already installed. If it has not yet been installed, Windows' plug & play subsystem automatically resets the Start value to 3 (Manual) when it installs USBSTOR after a USB storage device is plugged in for the first time.
  • 11. Disable Internet Access (All Windows) Open your registry and find the key below. [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings] Change the value of "ProxyEnable" and set it to "1". Change the value of "ProxyServer" and set it to an IP address and port that is invalid on your network such as "10.0.0.1:5555" (i.e. "IP:Port"). By changing these settings Internet access will be disabled for any applications that rely of the Microsoft proxy server information such as Internet Explorer, Microsoft Office, Opera browser. To stop users from modifying the proxy settings add these restrictions to disable changes to the Internet configuration. Find or create the key below: [HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel] Create two DWORD values named "Connection Settings" and "Connwiz Admin Lock" and set them both to "1". To remove the restriction, set the proxy settings back to their original values and delete the policy values.
  • 12. Restrict Applications Users Can Run (All Windows) Open your registry and find the key [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer] Create a new DWORD value and name it "RestrictRun" set the value to "1" to enable application restrictions or "0" to allow all applications to run. Then create a new sub-key called [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion \Policies\Explorer\RestrictRun] and define the applications that are allowed. Creating a new string value for each application, named as consecutive numbers, and setting the value to the filename to be allowed (e.g. "regedit.exe"). Restart Windows for the changes to take effect.
  • 13. THANKS A LOT FOR YOUR CO-OPERATION