SlideShare a Scribd company logo
1 of 60
MS DOS
• “config.sys” and “autoexec.bat”.
• “Config.sys” was used to load the device drivers and
• “autoexec.bat” was used to store the configurations of running
programs and other environmental variables
Win 3.0
• two files used in MS-DOS were replaced by INI files. These
files were used to store the configuration settings of the computers.
Windows 95
• In Windows 95, a hierarchical database named Registry was
introduced
• Although the Registry of Windows 95/98 has the similar structure as
Windows XP/Vista/7,
• the amount of data in Windows XP/Vista/7 Registry has grown
tremendously.
• The Registry in Windows XP/Vista/7 has a more stable and complex
structure than Windows 98/95/2000.
• In addition, the structure of Windows XP registry could be considered
as the basis of modern Windows
• The Windows Registry Editor is divided into two panels, the left one is
key panel and the right one is value panel. In the left panel,
KEY
• here are five root keys,
• HKEY_CLASSES_ROOT,
• HKEY_CURRENT_USER,
• HKEY_LOCAL_MACHINE,
• HKEY_USERS,
• HKEY_CURRENT_CONFIG
Keys
• this structure is just a logical
structure
• Among these five root
keys, only two root keys, These
two keys are called master keys.
HKEY_LOCAL_MACHINE
HKEY_USERS,
• Keys have physical files or hives
Derived keys
• The other three keys are derived keys since they are derived from the
two master keys and their subkeys .
HKEY_LOCAL_MACHINE ( HKLM)
• It contains all of the configuration settings of a computer.
• When a computer startups, the local machine settings will boot
before the individual user settings.
• Five Hives are
• HARDWARE,
• SAM,
• SECURITY,
• SOFTWARE,
and
• SYSTEM.
• HARDWARE is used to store the information of hardware devices that a computer
detects when the computer starts up. So, the subkeys in HARDWARE are also created
during the booting process.
• SAM is the abbreviation of Security Account Manager which is a local security database.
Subkeys in SAM contain the setting data of users and work groups.
• SECURITY includes a local security database in SAM and a strict ACL is used to manage
the users who could access the database.
• SOFTWARE includes all of the configuration settings of programs. Information on the
programs is stored in a standard format: HKLMSoftwareVendorProgramVersion.
• SYSTEM contains the configuration settings of hardware drivers and services. The key
path is
HKEY_LOCAL_MACHINESYSTEMControlSetXXX,
where XXX is a three digital number from 000,
HKEY_USERS (HKU)
• HKU is another master key. It
contains all of the per-user
settings
• current console user and other
users who logged on this
computer before
• 3 Basic Sub keys
• Defult
• SID
• SID_Classes
• Usually, we could see
• S-1-5-18, Local System Account
• S-1-5-19, Local Service Account,
• S-1-5-20, Network Service Account
HKEY_CLASSES_ROOT (HKCR).
oHKCR contains two keys:
HKLMSOFTWAREClasses & HKCUSoftwareClasses
HKEY_CURRENT_USER (HKCU).
• HKCU links to a subkey of HKU,
HKUSID.
• This key allows all of the Windows
programs and applications to
create, access, modify, and store
the information of current console
user without determining which
user is logging in.
• Have basic 5 Subkeys
• Environment is about the environmental configurations.
• Identities are related to Outlook Express.
• Network contains settings to connect the mapped network drive.
• Software refers to the user application settings.
• Volatile Environment is used to define the environmental variables
according to different users who logon a computer
Environment
Identities
Network
Software
Volatile Environment
HKEY_CURRENT_CONFIG (HKCC).
• HKCC is an image of the
hardware configuration profiles.
HKLMSYSTEMCurrentControlS
etHardwareCurrent, is also a
link to
HKLMSYSTEMControlSetHard
ware ProfielsXXXX, where XXXX
is a four digital number from
0000.
Values
• Just like a file of Windows, a value also has its properties.
Name, type, and data are the three components of a value. Every
value has a unique name. The naming regulations are also similar to
those of files. Some special characters such as “?”, “”, and so on
could not appear in the name of a value.
• here are six major types of values:
string, multistring, expandable string, binary, Dword, and Qword.
• String values are the easiest to understand because data in this type is
recorded in plain text in English.
• Multistring values include a list of strings with ASCII code 00 separating
these strings.
• Expandable string is another variant of string value. Expandable string
contains special variables such as %SYSTEMROOT%, %USERPROFILE% and
so on. These variables could replace some special path easily. For example,
if we want to locate the folder
X:Documents and SettingsusernameDesktop,
• The %USERPROFIEL%Desktop could be used no matter on which drive
windows are installed and which user logs on.
• Binary value also stores string but the data is displayed in hex format
and the information stored is always related to hardware.
• Unlike the above value types, the data stored in Dword and Qword
are not strings of characters. There are two numbers in Dword and
Qword types: 1 and 0 (usually 1 for enable and 0 for disable). In some
cases, numbers within 60 are used to indicate data related to timeout
settings. However, the difference between Dword and Qword is that
Dword stores 32-bit data and Qword stores 64-bit data
• If we use forensic tools to view the Windows Registry in an
offline environment or view the Registry remotely, only the two
master keys will be listed. So only the two master keys and their
subkeys have hives. The hives of HKLM’s subkeys are stored at
%SYSTEMROOT%System32config, and the hives of HKU’s subkeys
are stored at %USERPFOFILE%.
Cont…
Other Important Path
• HKLMSOFTWAREMicrosoftWindowsCurrentVersionApp Path
HKLMSOFTWARMicrosoftWindowsCurrentVersionUninstal
• Under HKLMSOFTWARE, the last logon user could also be found and
the exact key path is
HKLMSOFTWAREMicrosoftWindowsNTCurrentVersionWinlogon
HKLMSOFTWAREMicrosoftSecurity Center
HKLMSYSTEMCurrentControlSetServicesS
haredAccessParametersFirewallPolicy
HKLMSYSTEMCurrentControlSetServicesS
haredAccessParametersFirewallPolicy
HKLMSYSTEMCurrentControlSetServicesS
haredAccessParametersFirewallPolicy
HKLMSYSTEMCurrentControlSetServicesS
haredAccessParametersFirewallPolicy
HKLMSYSTEMCurrentControlSetServicesS
haredAccessParametersFirewallPolicy
HKLMSYSTEMCurrentControlSetServices,
• Each subkey of the Services key has
a DWORD value named “Start”
which
indicates the ways of booting.
• If the data is 2, this service will
start up with the boot of
Windows.
• If the data is 3, the service will be
started manually.
• If the data is 4, the service is
disabled

More Related Content

What's hot

File system security
File system securityFile system security
File system securityAmmAr mobark
 
File System Interface
File System InterfaceFile System Interface
File System Interfacechandinisanz
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System ForensicsArunJS5
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Buffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya JyothiBuffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya JyothiSowmya Jyothi
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in LinuxHenry Osborne
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsBrent Muir
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systemsvampugani
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicCTIN
 

What's hot (20)

File system security
File system securityFile system security
File system security
 
Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
File System Interface
File System InterfaceFile System Interface
File System Interface
 
File Systems
File SystemsFile Systems
File Systems
 
Operating System Forensics
Operating System ForensicsOperating System Forensics
Operating System Forensics
 
OSCh11
OSCh11OSCh11
OSCh11
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Ch11
Ch11Ch11
Ch11
 
Buffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya JyothiBuffer cache unix ppt Mrs.Sowmya Jyothi
Buffer cache unix ppt Mrs.Sowmya Jyothi
 
OSCh13
OSCh13OSCh13
OSCh13
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Ntfs forensics
Ntfs forensicsNtfs forensics
Ntfs forensics
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
File management
File managementFile management
File management
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
 
Ch12
Ch12Ch12
Ch12
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
File system implementation
File system implementationFile system implementation
File system implementation
 

Similar to Registry Forensic

CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsNatraj G
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistrySam Bowne
 
FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION
FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSIONFORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION
FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSIONIJNSA Journal
 
Selecting and Installing Operating System
Selecting and Installing Operating SystemSelecting and Installing Operating System
Selecting and Installing Operating SystemAmir Villas
 
CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)Sam Bowne
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
Windows internals
Windows internalsWindows internals
Windows internalsPiyush Jain
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxPoornimaGhodke3
 
Windows_Installation.pptx
Windows_Installation.pptxWindows_Installation.pptx
Windows_Installation.pptxLearyJohn
 
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
Mba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systemsMba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systemsRai University
 
Mba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systemsMba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systemsRai University
 
Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech) Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech) Yashpal Rathore
 

Similar to Registry Forensic (20)

RegEdit
RegEditRegEdit
RegEdit
 
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
 
Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows Programs
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
 
FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION
FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSIONFORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION
FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION
 
Windows 2000
Windows 2000Windows 2000
Windows 2000
 
Selecting and Installing Operating System
Selecting and Installing Operating SystemSelecting and Installing Operating System
Selecting and Installing Operating System
 
CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)
 
12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
4. Centos Administration
4. Centos Administration4. Centos Administration
4. Centos Administration
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Registry Forensics
Registry ForensicsRegistry Forensics
Registry Forensics
 
Windows internals
Windows internalsWindows internals
Windows internals
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
 
Windows_Installation.pptx
Windows_Installation.pptxWindows_Installation.pptx
Windows_Installation.pptx
 
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
 
Mba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systemsMba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systems
 
Mba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systemsMba i-ifm-u-3 operating systems
Mba i-ifm-u-3 operating systems
 
Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech) Seminar Topic Registry (M.Tech)
Seminar Topic Registry (M.Tech)
 
Ch07
Ch07Ch07
Ch07
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Registry Forensic

  • 1. MS DOS • “config.sys” and “autoexec.bat”. • “Config.sys” was used to load the device drivers and • “autoexec.bat” was used to store the configurations of running programs and other environmental variables
  • 2. Win 3.0 • two files used in MS-DOS were replaced by INI files. These files were used to store the configuration settings of the computers.
  • 3. Windows 95 • In Windows 95, a hierarchical database named Registry was introduced
  • 4. • Although the Registry of Windows 95/98 has the similar structure as Windows XP/Vista/7, • the amount of data in Windows XP/Vista/7 Registry has grown tremendously. • The Registry in Windows XP/Vista/7 has a more stable and complex structure than Windows 98/95/2000. • In addition, the structure of Windows XP registry could be considered as the basis of modern Windows
  • 5. • The Windows Registry Editor is divided into two panels, the left one is key panel and the right one is value panel. In the left panel,
  • 6. KEY • here are five root keys, • HKEY_CLASSES_ROOT, • HKEY_CURRENT_USER, • HKEY_LOCAL_MACHINE, • HKEY_USERS, • HKEY_CURRENT_CONFIG
  • 7. Keys • this structure is just a logical structure • Among these five root keys, only two root keys, These two keys are called master keys. HKEY_LOCAL_MACHINE HKEY_USERS, • Keys have physical files or hives
  • 8. Derived keys • The other three keys are derived keys since they are derived from the two master keys and their subkeys .
  • 9. HKEY_LOCAL_MACHINE ( HKLM) • It contains all of the configuration settings of a computer. • When a computer startups, the local machine settings will boot before the individual user settings. • Five Hives are • HARDWARE, • SAM, • SECURITY, • SOFTWARE, and • SYSTEM.
  • 10.
  • 11. • HARDWARE is used to store the information of hardware devices that a computer detects when the computer starts up. So, the subkeys in HARDWARE are also created during the booting process. • SAM is the abbreviation of Security Account Manager which is a local security database. Subkeys in SAM contain the setting data of users and work groups. • SECURITY includes a local security database in SAM and a strict ACL is used to manage the users who could access the database. • SOFTWARE includes all of the configuration settings of programs. Information on the programs is stored in a standard format: HKLMSoftwareVendorProgramVersion. • SYSTEM contains the configuration settings of hardware drivers and services. The key path is HKEY_LOCAL_MACHINESYSTEMControlSetXXX, where XXX is a three digital number from 000,
  • 12. HKEY_USERS (HKU) • HKU is another master key. It contains all of the per-user settings • current console user and other users who logged on this computer before • 3 Basic Sub keys • Defult • SID • SID_Classes
  • 13. • Usually, we could see • S-1-5-18, Local System Account • S-1-5-19, Local Service Account, • S-1-5-20, Network Service Account
  • 14. HKEY_CLASSES_ROOT (HKCR). oHKCR contains two keys: HKLMSOFTWAREClasses & HKCUSoftwareClasses
  • 15. HKEY_CURRENT_USER (HKCU). • HKCU links to a subkey of HKU, HKUSID. • This key allows all of the Windows programs and applications to create, access, modify, and store the information of current console user without determining which user is logging in. • Have basic 5 Subkeys
  • 16. • Environment is about the environmental configurations. • Identities are related to Outlook Express. • Network contains settings to connect the mapped network drive. • Software refers to the user application settings. • Volatile Environment is used to define the environmental variables according to different users who logon a computer
  • 22. HKEY_CURRENT_CONFIG (HKCC). • HKCC is an image of the hardware configuration profiles. HKLMSYSTEMCurrentControlS etHardwareCurrent, is also a link to HKLMSYSTEMControlSetHard ware ProfielsXXXX, where XXXX is a four digital number from 0000.
  • 23. Values • Just like a file of Windows, a value also has its properties. Name, type, and data are the three components of a value. Every value has a unique name. The naming regulations are also similar to those of files. Some special characters such as “?”, “”, and so on could not appear in the name of a value. • here are six major types of values: string, multistring, expandable string, binary, Dword, and Qword.
  • 24. • String values are the easiest to understand because data in this type is recorded in plain text in English. • Multistring values include a list of strings with ASCII code 00 separating these strings. • Expandable string is another variant of string value. Expandable string contains special variables such as %SYSTEMROOT%, %USERPROFILE% and so on. These variables could replace some special path easily. For example, if we want to locate the folder X:Documents and SettingsusernameDesktop, • The %USERPROFIEL%Desktop could be used no matter on which drive windows are installed and which user logs on.
  • 25. • Binary value also stores string but the data is displayed in hex format and the information stored is always related to hardware. • Unlike the above value types, the data stored in Dword and Qword are not strings of characters. There are two numbers in Dword and Qword types: 1 and 0 (usually 1 for enable and 0 for disable). In some cases, numbers within 60 are used to indicate data related to timeout settings. However, the difference between Dword and Qword is that Dword stores 32-bit data and Qword stores 64-bit data
  • 26. • If we use forensic tools to view the Windows Registry in an offline environment or view the Registry remotely, only the two master keys will be listed. So only the two master keys and their subkeys have hives. The hives of HKLM’s subkeys are stored at %SYSTEMROOT%System32config, and the hives of HKU’s subkeys are stored at %USERPFOFILE%.
  • 27.
  • 28.
  • 29.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51. Other Important Path • HKLMSOFTWAREMicrosoftWindowsCurrentVersionApp Path
  • 53. • Under HKLMSOFTWARE, the last logon user could also be found and the exact key path is HKLMSOFTWAREMicrosoftWindowsNTCurrentVersionWinlogon
  • 60. HKLMSYSTEMCurrentControlSetServices, • Each subkey of the Services key has a DWORD value named “Start” which indicates the ways of booting. • If the data is 2, this service will start up with the boot of Windows. • If the data is 3, the service will be started manually. • If the data is 4, the service is disabled