SlideShare a Scribd company logo
1 of 13
Download to read offline
College of Technological Innovation
MSIT 10, CIT 530 Cyber Forensics
Lab 5:
File Structure Analysis & Examine the Windows Registry
Supervised by:
Dr. Farkhund Iqbal Ms. Mona Bader
Prepared by:
Musaab Hasan Zayed Balbahaith Abdulrahman Sabbagh
M80006988@zu.ac.ae M80007225@zu.ac.ae M80007043@zu.ac.ae
September 28, 2016
List of Figures
Figure 1: A file was created on the flash disk with the following paragraph......3
Figure 2: WinHex used to open the flash disk..................................................................3
Figure 3: A "Security" word searched on the flash disk...............................................4
Figure 4: the display result for the searched word........................................................4
Figure 5: the text file was deleted..........................................................................................5
Figure 6: A "Security" word searched on the flash disk after deleted....................5
Figure 7: the display result for the searched word after deleting the file...........6
Figure 8: a Quick format have been applied on the flash disk...................................6
Figure 9: A "Security" word searched on the flash disk after a quick format
applied...............................................................................................................................................7
Figure 10: a full format have been applied on the flash disk.....................................7
Figure 11: A "Security" word searched on the flash disk after a full format
applied...............................................................................................................................................8
Figure 12: A "security" word was not found.....................................................................8
Figure 13: finding the repeating pattern of F6.................................................................9
Figure 14: the second appearance of the pattern F6....................................................9
Figure 15: A search on the acquired image of windows 98 have been applied
............................................................................................................................................................ 10
Figure 16: Content search applied for the system.dat & user.dat......................... 10
............................................................................................Figure 17: Registry files extracted
............................................................................................................................................................ 11
Figure 18: finding the key word "superior" and searching for whole
occurrence .................................................................................................................................... 11
Figure 19: Copying the Key Name for the key word "superior" in text file....... 12
Figure 20: finding the key word "superior" & “denise” and searching for
whole occurrence and copying the Key in text file Name........................................ 12
Figure 21: Deleting the redundant folder names and saving the final file........ 13
Executive Summary
On the first part a located data on a disk was investigated using WinHex regardless of how the operating
system render it. A few scenarios have been applied to test the existence of the file using different
methods. On the second part a windows registry have been used to extract System.dat & User.dat on
the image file and searching on those files for specific information then copy the registry path to a text
file.
Part 1 : File Structure Analysis
Phase1 : setup
Figure 1: A file was created on the flash disk with the following paragraph.
Phase2 : Opening and searching the flash disk
Figure 2: WinHex used to open the flash disk
Figure 3: A "Security" word searched on the flash disk
Figure 4: the display result for the searched word
Result 1: the word was found on the flash disk since the file already existed
on the flash and wasn’t deleted.
Phase3 : Opening and searching the flash disk after a delete
Figure 5: the text file was deleted
Figure 6: A "Security" word searched on the flash disk after deleted
Figure 7: the display result for the searched word after deleting the file
Result 2: the word was found on the flash disk after deleting the file since the
file still on the original place except it is not readily viewable or accessible.
Phase4 : Opening and searching the flash disk after a Quick format
Figure 8: a Quick format have been applied on the flash disk
Figure 9: A "Security" word searched on the flash disk after a quick format applied
Result 3: the word was found on the flash disk after applying a quick format
since it’s not checking the bad sector and the volume of the drive can be re-
built to gain access to the deleted files again.
Phase5 : Opening and searching the flash disk after a full format
Figure 10: a full format have been applied on the flash disk
Figure 11: A "Security" word searched on the flash disk after a full format applied
Figure 12: A "security" word was not found
Result 4: the word was not found on the flash disk after applying a full format
since its checks the bad sectors also on the disk.
Figure 13: finding the repeating pattern of F6
Figure 14: the second appearance of the pattern F6
Part2 : Examine the Windows Registry
Figure 15: A search on the acquired image of windows 98 have been applied
Figure 16: Content search applied for the system.dat & user.dat
Figure 17: Registry files extracted
Figure 18: finding the key word "superior" and searching for whole occurrence
Figure 19: Copying the Key Name for the key word "superior" in text file
Figure 20: finding the key word "superior" & “denise” and searching for whole occurrence and copying the Key
in text file Name
Figure 21:

More Related Content

What's hot

Hosts setup
Hosts setupHosts setup
Hosts setupdragoj
 
Windows 10 Data Recovery
Windows 10 Data RecoveryWindows 10 Data Recovery
Windows 10 Data RecoveryRemo Recover
 
Microsoft Windows 10 Professional
Microsoft Windows 10 ProfessionalMicrosoft Windows 10 Professional
Microsoft Windows 10 Professionalcdkey deal
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGene Carboni
 

What's hot (9)

Hosts setup
Hosts setupHosts setup
Hosts setup
 
Windows 10 Data Recovery
Windows 10 Data RecoveryWindows 10 Data Recovery
Windows 10 Data Recovery
 
General Knowledge
General KnowledgeGeneral Knowledge
General Knowledge
 
Microsoft Windows 10 Professional
Microsoft Windows 10 ProfessionalMicrosoft Windows 10 Professional
Microsoft Windows 10 Professional
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing Disks
 
Comodo presentation
Comodo presentationComodo presentation
Comodo presentation
 
Windows 8
Windows 8Windows 8
Windows 8
 
Windows 7
Windows 7Windows 7
Windows 7
 
My Teacher Got IT v2.0 - Software Installation Track
My Teacher Got IT v2.0 - Software Installation TrackMy Teacher Got IT v2.0 - Software Installation Track
My Teacher Got IT v2.0 - Software Installation Track
 

Similar to Cyber forensics Lab

841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docxevonnehoggarth79783
 
FTK report PART I Familiar with FTK ImagerBonus Exerc.docx
FTK report PART I Familiar with FTK ImagerBonus Exerc.docxFTK report PART I Familiar with FTK ImagerBonus Exerc.docx
FTK report PART I Familiar with FTK ImagerBonus Exerc.docxbudbarber38650
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newKatherineJack1
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newEmmaJack2018
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newmarysherman2018
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newsweetsour2017
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newLillieDickey
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newsarahlazeto
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newlizabonilla
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5Brent Muir
 
For the accompanying inquiries enter the answer and give complete expl.docx
For the accompanying inquiries enter the answer and give complete expl.docxFor the accompanying inquiries enter the answer and give complete expl.docx
For the accompanying inquiries enter the answer and give complete expl.docxedmundp8cgllams
 
Data hiding and finding on Linux
Data hiding and finding on LinuxData hiding and finding on Linux
Data hiding and finding on LinuxAnton Chuvakin
 
Corporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by AzadCorporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by AzadAzad Mzuri
 
Windows FTK Forensics.pdf
Windows FTK Forensics.pdfWindows FTK Forensics.pdf
Windows FTK Forensics.pdfssusere6dc9d
 
From hybernation file to malware analysis with volatility
From hybernation file to malware analysis with volatilityFrom hybernation file to malware analysis with volatility
From hybernation file to malware analysis with volatilityChristiaan Beek
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docxRajAmbere1
 

Similar to Cyber forensics Lab (20)

841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
841- Advanced Computer ForensicsUnix Forensics LabDue Date.docx
 
FTK report PART I Familiar with FTK ImagerBonus Exerc.docx
FTK report PART I Familiar with FTK ImagerBonus Exerc.docxFTK report PART I Familiar with FTK ImagerBonus Exerc.docx
FTK report PART I Familiar with FTK ImagerBonus Exerc.docx
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5
 
Data Forensics Tool
Data Forensics ToolData Forensics Tool
Data Forensics Tool
 
For the accompanying inquiries enter the answer and give complete expl.docx
For the accompanying inquiries enter the answer and give complete expl.docxFor the accompanying inquiries enter the answer and give complete expl.docx
For the accompanying inquiries enter the answer and give complete expl.docx
 
Data hiding and finding on Linux
Data hiding and finding on LinuxData hiding and finding on Linux
Data hiding and finding on Linux
 
Corporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by AzadCorporate Secret Challenge - CyberDefenders.org by Azad
Corporate Secret Challenge - CyberDefenders.org by Azad
 
Ace user manual in english
Ace user manual in englishAce user manual in english
Ace user manual in english
 
Unix Work
Unix WorkUnix Work
Unix Work
 
Windows FTK Forensics.pdf
Windows FTK Forensics.pdfWindows FTK Forensics.pdf
Windows FTK Forensics.pdf
 
From hybernation file to malware analysis with volatility
From hybernation file to malware analysis with volatilityFrom hybernation file to malware analysis with volatility
From hybernation file to malware analysis with volatility
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docx
 

More from MUSAAB HASAN

Communication & switching networks lab manual
Communication & switching networks lab manualCommunication & switching networks lab manual
Communication & switching networks lab manualMUSAAB HASAN
 
Instruction manual for E Archiving
Instruction manual for E ArchivingInstruction manual for E Archiving
Instruction manual for E ArchivingMUSAAB HASAN
 
Instruction manual for E Archiving
Instruction manual for E ArchivingInstruction manual for E Archiving
Instruction manual for E ArchivingMUSAAB HASAN
 
A Security Study for Smart Metering Systems
A Security Study for Smart Metering SystemsA Security Study for Smart Metering Systems
A Security Study for Smart Metering SystemsMUSAAB HASAN
 
Engineering design via autocad
Engineering design via autocadEngineering design via autocad
Engineering design via autocadMUSAAB HASAN
 
Android Applications development Using APP inventor
Android Applications development Using APP inventorAndroid Applications development Using APP inventor
Android Applications development Using APP inventorMUSAAB HASAN
 
Engineering Design vis Microsoft Visio
Engineering Design vis Microsoft VisioEngineering Design vis Microsoft Visio
Engineering Design vis Microsoft VisioMUSAAB HASAN
 
Microcontrollers programming Raspberry Pi
Microcontrollers programming Raspberry Pi Microcontrollers programming Raspberry Pi
Microcontrollers programming Raspberry Pi MUSAAB HASAN
 
Using PCB wizard for PCB implementation
Using PCB wizard for PCB implementationUsing PCB wizard for PCB implementation
Using PCB wizard for PCB implementationMUSAAB HASAN
 
PC techniques software and Hardware
PC techniques software and HardwarePC techniques software and Hardware
PC techniques software and HardwareMUSAAB HASAN
 
Datasheets & Searching information
Datasheets & Searching informationDatasheets & Searching information
Datasheets & Searching informationMUSAAB HASAN
 
Lab 1 Bag & Tag (cyber forensics)
Lab 1 Bag & Tag (cyber forensics)Lab 1 Bag & Tag (cyber forensics)
Lab 1 Bag & Tag (cyber forensics)MUSAAB HASAN
 
Cyber forensics lab 4
Cyber forensics lab 4Cyber forensics lab 4
Cyber forensics lab 4MUSAAB HASAN
 
2016 ieee uae_student_day_sep_description_aau-dec-01-2015
2016 ieee uae_student_day_sep_description_aau-dec-01-20152016 ieee uae_student_day_sep_description_aau-dec-01-2015
2016 ieee uae_student_day_sep_description_aau-dec-01-2015MUSAAB HASAN
 

More from MUSAAB HASAN (14)

Communication & switching networks lab manual
Communication & switching networks lab manualCommunication & switching networks lab manual
Communication & switching networks lab manual
 
Instruction manual for E Archiving
Instruction manual for E ArchivingInstruction manual for E Archiving
Instruction manual for E Archiving
 
Instruction manual for E Archiving
Instruction manual for E ArchivingInstruction manual for E Archiving
Instruction manual for E Archiving
 
A Security Study for Smart Metering Systems
A Security Study for Smart Metering SystemsA Security Study for Smart Metering Systems
A Security Study for Smart Metering Systems
 
Engineering design via autocad
Engineering design via autocadEngineering design via autocad
Engineering design via autocad
 
Android Applications development Using APP inventor
Android Applications development Using APP inventorAndroid Applications development Using APP inventor
Android Applications development Using APP inventor
 
Engineering Design vis Microsoft Visio
Engineering Design vis Microsoft VisioEngineering Design vis Microsoft Visio
Engineering Design vis Microsoft Visio
 
Microcontrollers programming Raspberry Pi
Microcontrollers programming Raspberry Pi Microcontrollers programming Raspberry Pi
Microcontrollers programming Raspberry Pi
 
Using PCB wizard for PCB implementation
Using PCB wizard for PCB implementationUsing PCB wizard for PCB implementation
Using PCB wizard for PCB implementation
 
PC techniques software and Hardware
PC techniques software and HardwarePC techniques software and Hardware
PC techniques software and Hardware
 
Datasheets & Searching information
Datasheets & Searching informationDatasheets & Searching information
Datasheets & Searching information
 
Lab 1 Bag & Tag (cyber forensics)
Lab 1 Bag & Tag (cyber forensics)Lab 1 Bag & Tag (cyber forensics)
Lab 1 Bag & Tag (cyber forensics)
 
Cyber forensics lab 4
Cyber forensics lab 4Cyber forensics lab 4
Cyber forensics lab 4
 
2016 ieee uae_student_day_sep_description_aau-dec-01-2015
2016 ieee uae_student_day_sep_description_aau-dec-01-20152016 ieee uae_student_day_sep_description_aau-dec-01-2015
2016 ieee uae_student_day_sep_description_aau-dec-01-2015
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Cyber forensics Lab

  • 1. College of Technological Innovation MSIT 10, CIT 530 Cyber Forensics Lab 5: File Structure Analysis & Examine the Windows Registry Supervised by: Dr. Farkhund Iqbal Ms. Mona Bader Prepared by: Musaab Hasan Zayed Balbahaith Abdulrahman Sabbagh M80006988@zu.ac.ae M80007225@zu.ac.ae M80007043@zu.ac.ae September 28, 2016
  • 2. List of Figures Figure 1: A file was created on the flash disk with the following paragraph......3 Figure 2: WinHex used to open the flash disk..................................................................3 Figure 3: A "Security" word searched on the flash disk...............................................4 Figure 4: the display result for the searched word........................................................4 Figure 5: the text file was deleted..........................................................................................5 Figure 6: A "Security" word searched on the flash disk after deleted....................5 Figure 7: the display result for the searched word after deleting the file...........6 Figure 8: a Quick format have been applied on the flash disk...................................6 Figure 9: A "Security" word searched on the flash disk after a quick format applied...............................................................................................................................................7 Figure 10: a full format have been applied on the flash disk.....................................7 Figure 11: A "Security" word searched on the flash disk after a full format applied...............................................................................................................................................8 Figure 12: A "security" word was not found.....................................................................8 Figure 13: finding the repeating pattern of F6.................................................................9 Figure 14: the second appearance of the pattern F6....................................................9 Figure 15: A search on the acquired image of windows 98 have been applied ............................................................................................................................................................ 10 Figure 16: Content search applied for the system.dat & user.dat......................... 10 ............................................................................................Figure 17: Registry files extracted ............................................................................................................................................................ 11 Figure 18: finding the key word "superior" and searching for whole occurrence .................................................................................................................................... 11 Figure 19: Copying the Key Name for the key word "superior" in text file....... 12 Figure 20: finding the key word "superior" & “denise” and searching for whole occurrence and copying the Key in text file Name........................................ 12 Figure 21: Deleting the redundant folder names and saving the final file........ 13
  • 3. Executive Summary On the first part a located data on a disk was investigated using WinHex regardless of how the operating system render it. A few scenarios have been applied to test the existence of the file using different methods. On the second part a windows registry have been used to extract System.dat & User.dat on the image file and searching on those files for specific information then copy the registry path to a text file. Part 1 : File Structure Analysis Phase1 : setup Figure 1: A file was created on the flash disk with the following paragraph. Phase2 : Opening and searching the flash disk Figure 2: WinHex used to open the flash disk
  • 4. Figure 3: A "Security" word searched on the flash disk Figure 4: the display result for the searched word Result 1: the word was found on the flash disk since the file already existed on the flash and wasn’t deleted.
  • 5. Phase3 : Opening and searching the flash disk after a delete Figure 5: the text file was deleted Figure 6: A "Security" word searched on the flash disk after deleted
  • 6. Figure 7: the display result for the searched word after deleting the file Result 2: the word was found on the flash disk after deleting the file since the file still on the original place except it is not readily viewable or accessible. Phase4 : Opening and searching the flash disk after a Quick format Figure 8: a Quick format have been applied on the flash disk
  • 7. Figure 9: A "Security" word searched on the flash disk after a quick format applied Result 3: the word was found on the flash disk after applying a quick format since it’s not checking the bad sector and the volume of the drive can be re- built to gain access to the deleted files again. Phase5 : Opening and searching the flash disk after a full format Figure 10: a full format have been applied on the flash disk
  • 8. Figure 11: A "Security" word searched on the flash disk after a full format applied Figure 12: A "security" word was not found Result 4: the word was not found on the flash disk after applying a full format since its checks the bad sectors also on the disk.
  • 9. Figure 13: finding the repeating pattern of F6 Figure 14: the second appearance of the pattern F6
  • 10. Part2 : Examine the Windows Registry Figure 15: A search on the acquired image of windows 98 have been applied Figure 16: Content search applied for the system.dat & user.dat
  • 11. Figure 17: Registry files extracted Figure 18: finding the key word "superior" and searching for whole occurrence
  • 12. Figure 19: Copying the Key Name for the key word "superior" in text file Figure 20: finding the key word "superior" & “denise” and searching for whole occurrence and copying the Key in text file Name