SlideShare a Scribd company logo
Computer Forensics
Windows Artifacts
© Pearson Education Computer Forensics: Principles and Practices 2
Objectives
 Conduct efficient and effective investigations
of Windows systems
 Find user data and profiles in Windows
folders
 Locate system artifacts in Windows systems
© Pearson Education Computer Forensics: Principles and Practices 3
Introduction
In many cases you may have gigabytes or even
terabytes of data that must be searched for
evidence. Maximize efficiency of the search by
showing default locations of file storage.
© Pearson Education Computer Forensics: Principles and Practices 4
Investigating Windows Systems
 Activities of the user result in user data
 User profiles
 Program files
 Temporary files (temp files)
 Special application-level files
© Pearson Education Computer Forensics: Principles and Practices 5
Investigating Windows Systems
(Cont.)
 System data and artifacts are generated by
the operating system
 Metadata
 Windows system registry
 Event logs or log files
 Swap files
 Printer spool
 Recycle Bin
© Pearson Education Computer Forensics: Principles and Practices 6
Investigating Windows Systems
(Cont.)
 Identify the operating systems of a target
hard drive by:
 Operating system folder names
 The folder for the Recycle Bin
 The construction of the user root folders because
of the differences in the way user data is kept
© Pearson Education Computer Forensics: Principles and Practices 7
Finding User Data and Profiles in
Windows Folders
 Documents and Settings / Users folders
 Contains a user root folder for each user account
created on the computer
 Windows NT and above automatically install
 Administrator
 All users
 Default user (hidden)
© Pearson Education Computer Forensics: Principles and Practices 8
Finding User Data and Profiles in
Windows Folders (Cont.)
 Data stored in the user root folder:
 Desktop settings, such as wallpaper,
screensavers, color schemes, and themes
 Internet customizations, such as the homepage,
favorites, and history
 Application parameters and data, such as e-mail
and upgrades
 Personal files and folders, such as My
Documents, My Pictures, and so on
© Pearson Education Computer Forensics: Principles and Practices 9
Finding User Data and Profiles in
Windows Folders (Cont.)
 Some of the subfolders in the user root folder
include:
 Application data (hidden)
 Cookies
 Desktop
 Favorites
 Local Settings (hidden)
 My Documents
 NetHood (hidden)
© Pearson Education Computer Forensics: Principles and Practices 10
Finding User Data and Profiles in
Windows Folders (Cont.)
© Pearson Education Computer Forensics: Principles and Practices 11
Location of User Root Folders
Operating System
(Platform) User Root Folder Location
Windows 9x <partition>:WINDOWSProfilesuserid USER.DAT file
Windows NT <partition>:WINNTProfilesuserid NTUSER.DAT
file
Windows 2000 and
Windows XP
<partition>:Documents and
Settingsuserid
NTUSER.DAT
file
Windows 7/8/10 <partition>:Usersuserid NTUser.DAT
© Pearson Education Computer Forensics: Principles and Practices 12
Location of User Root Folders
© Pearson Education Computer Forensics: Principles and Practices 13
In Practice: Temp Internet Files
Provide Valuable E-Evidence
© Pearson Education Computer Forensics: Principles and Practices 14
Investigating System Artifacts
 Types of metadata
 Descriptive: describes a resource for purposes
such as discovery and identification
 Structural: indicates how compound objects are
put together
 Administrative: provides information to help
manage a resource, such as when it was created,
last accessed, and modified
© Pearson Education Computer Forensics: Principles and Practices 15
Investigating System Artifacts
(Cont.)
 Registry
 Can reveal current and past applications, as well
as programs that start automatically at bootup
 Viewing the registry requires a registry editor
 Event logs track system events
 Application log tracks application events
 Security log shows logon attempts
 System log tracks events such as driver failures
© Pearson Education Computer Forensics: Principles and Practices 16
Investigating System Artifacts
(Cont.)
 Swap file/page file
 Used by the system as virtual memory
 Can provide the investigator with a snapshot of
volatile memory
 Print spool
 May contain enhanced metafiles of print jobs
 Recycle Bin/Recycler
 Stores files the user has deleted
© Pearson Education Computer Forensics: Principles and Practices 17
Investigating System Artifacts
(Cont.) - Thumbs.DB
© Pearson Education Computer Forensics: Principles and Practices 18
Investigating System Artifacts
(Cont.) - Print spool
Select 41 bytes
© Pearson Education Computer Forensics: Principles and Practices 19
Investigating System Artifacts
(Cont.) - Print spool
© Pearson Education Computer Forensics: Principles and Practices 20
Investigating System Artifacts
(Cont.) - Recycle Bin/Recycler
© Pearson Education Computer Forensics: Principles and Practices 21
Investigating System Artifacts
(Cont.) – link files & recent used files
© Pearson Education Computer Forensics: Principles and Practices 22
Investigating System Artifacts
(Cont.) – Store points
© Pearson Education Computer Forensics: Principles and Practices 23
Investigating System Artifacts
(Cont.) – Logs
Windows NT, 2000, XP maintain log files
 System Log
 Application Log
 Security Log
© Pearson Education Computer Forensics: Principles and Practices 24
Investigating System Artifacts
(Cont.) – Logs
Live System:
 Use Event
Viewer
© Pearson Education Computer Forensics: Principles and Practices 25
Investigating System Artifacts
(Cont.) – Logs Event Viewer
 Event Viewer
© Pearson Education Computer Forensics: Principles and Practices 26
Investigating System Artifacts
(Cont.) – Logs from forensics duplicate
(Windows/System32/Config/)
 SecEvent.evt
 AppEvent.evt
 SysEvent.evt
© Pearson Education Computer Forensics: Principles and Practices 27
Investigating System Artifacts
(Cont.) – $ Logfile
 $Logfile entry in the MFT contains the log of
all file system transactions
 Deletion of a file leaves several entries in
$Logfile
 Not unusual to find files that are no longer on
the disk
 Shows that file was used by the system
© Pearson Education Computer Forensics: Principles and Practices 28
Investigating System Artifacts
(Cont.) – Temporary Files
 Temporary files
 Files with extension tmp
 Created by many applications
 Emails with large attachments:
 Attachments are probably stored as temp files.
(Depends on email system.)
 Look for file extensions .tmp
© Pearson Education Computer Forensics: Principles and Practices 29
Investigating System Artifacts
(Cont.) – Internet Explorer
 Internet Explorer (as well as other browsers)
use a cache.
 index.dat contains internet explorer cached
websites.
© Pearson Education Computer Forensics: Principles and Practices 30
Investigating System Artifacts
(Cont.) – Temporary Files
© Pearson Education Computer Forensics: Principles and Practices 31
Investigating System Artifacts
(Cont.) - Recycle Bin/Recycler
© Pearson Education Computer Forensics: Principles and Practices 32
Investigating System Artifacts
(Cont.) – Swap Files
 Windows 2000 & WinXP & Above
 Pagefile.sys
 Windows 98
 Win386.swp
© Pearson Education Computer Forensics: Principles and Practices 33
Summary
 Search times can be reduced through the use
of default folders and operating system
artifacts
 The skill level of the user will determine
whether this is an effective use of time in the
case
© Pearson Education Computer Forensics: Principles and Practices 34
34
Questions?
Majdi.Owda@aaup.edu

More Related Content

Similar to Lecture-1-Windows-Artefacts.pdf

3170725_Unit-4.pptx
3170725_Unit-4.pptx3170725_Unit-4.pptx
3170725_Unit-4.pptx
YashPatel132112
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
DFSNov1.pptx
DFSNov1.pptxDFSNov1.pptx
DFSNov1.pptx
EngrNabidRayhanKhale
 
Electronic Data Processing
Electronic Data ProcessingElectronic Data Processing
Electronic Data Processing
Anjan Mahanta
 
System calls operating system ppt by rohit malav
System calls operating system  ppt by rohit malavSystem calls operating system  ppt by rohit malav
System calls operating system ppt by rohit malav
Rohit malav
 
Database Systems-Lec 1.ppt
Database Systems-Lec 1.pptDatabase Systems-Lec 1.ppt
Database Systems-Lec 1.ppt
sara591850
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
AsmaaFaried1
 
Degonto file management
Degonto file managementDegonto file management
Degonto file management
Degonto Islam
 
operating system structure
operating system structureoperating system structure
operating system structure
HAMZA AHMED
 
Lecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file systemLecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file system
Alchemist095
 
FILE MANAGEMENT.pptx
FILE MANAGEMENT.pptxFILE MANAGEMENT.pptx
FILE MANAGEMENT.pptx
jayashri kolekar
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
RubaNagarajan
 
9781111306366 ppt ch11
9781111306366 ppt ch119781111306366 ppt ch11
9781111306366 ppt ch11
Dr. Ahmed Al Zaidy
 
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009ClubHack
 
Structure of operating system
Structure of operating systemStructure of operating system
Structure of operating systemRafi Dar
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
solarisyougood
 
Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0
Brent Muir
 
Lecture_02_Operating System Structures Operating Systems
Lecture_02_Operating System Structures Operating SystemsLecture_02_Operating System Structures Operating Systems
Lecture_02_Operating System Structures Operating Systems
ArnoyKhan
 
DOS Operating System
DOS Operating SystemDOS Operating System
DOS Operating System
Anjan Mahanta
 

Similar to Lecture-1-Windows-Artefacts.pdf (20)

3170725_Unit-4.pptx
3170725_Unit-4.pptx3170725_Unit-4.pptx
3170725_Unit-4.pptx
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
DFSNov1.pptx
DFSNov1.pptxDFSNov1.pptx
DFSNov1.pptx
 
Electronic Data Processing
Electronic Data ProcessingElectronic Data Processing
Electronic Data Processing
 
System calls operating system ppt by rohit malav
System calls operating system  ppt by rohit malavSystem calls operating system  ppt by rohit malav
System calls operating system ppt by rohit malav
 
Database Systems-Lec 1.ppt
Database Systems-Lec 1.pptDatabase Systems-Lec 1.ppt
Database Systems-Lec 1.ppt
 
Chapter 12.pptx
Chapter 12.pptxChapter 12.pptx
Chapter 12.pptx
 
Degonto file management
Degonto file managementDegonto file management
Degonto file management
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Lecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file systemLecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file system
 
FILE MANAGEMENT.pptx
FILE MANAGEMENT.pptxFILE MANAGEMENT.pptx
FILE MANAGEMENT.pptx
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
9781111306366 ppt ch11
9781111306366 ppt ch119781111306366 ppt ch11
9781111306366 ppt ch11
 
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
Kush wadhwa _mining_digital_evidence_in_windows - ClubHack2009
 
Structure of operating system
Structure of operating systemStructure of operating system
Structure of operating system
 
02010 ppt ch01
02010 ppt ch0102010 ppt ch01
02010 ppt ch01
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
 
Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0
 
Lecture_02_Operating System Structures Operating Systems
Lecture_02_Operating System Structures Operating SystemsLecture_02_Operating System Structures Operating Systems
Lecture_02_Operating System Structures Operating Systems
 
DOS Operating System
DOS Operating SystemDOS Operating System
DOS Operating System
 

Recently uploaded

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 

Recently uploaded (20)

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 

Lecture-1-Windows-Artefacts.pdf

  • 2. © Pearson Education Computer Forensics: Principles and Practices 2 Objectives  Conduct efficient and effective investigations of Windows systems  Find user data and profiles in Windows folders  Locate system artifacts in Windows systems
  • 3. © Pearson Education Computer Forensics: Principles and Practices 3 Introduction In many cases you may have gigabytes or even terabytes of data that must be searched for evidence. Maximize efficiency of the search by showing default locations of file storage.
  • 4. © Pearson Education Computer Forensics: Principles and Practices 4 Investigating Windows Systems  Activities of the user result in user data  User profiles  Program files  Temporary files (temp files)  Special application-level files
  • 5. © Pearson Education Computer Forensics: Principles and Practices 5 Investigating Windows Systems (Cont.)  System data and artifacts are generated by the operating system  Metadata  Windows system registry  Event logs or log files  Swap files  Printer spool  Recycle Bin
  • 6. © Pearson Education Computer Forensics: Principles and Practices 6 Investigating Windows Systems (Cont.)  Identify the operating systems of a target hard drive by:  Operating system folder names  The folder for the Recycle Bin  The construction of the user root folders because of the differences in the way user data is kept
  • 7. © Pearson Education Computer Forensics: Principles and Practices 7 Finding User Data and Profiles in Windows Folders  Documents and Settings / Users folders  Contains a user root folder for each user account created on the computer  Windows NT and above automatically install  Administrator  All users  Default user (hidden)
  • 8. © Pearson Education Computer Forensics: Principles and Practices 8 Finding User Data and Profiles in Windows Folders (Cont.)  Data stored in the user root folder:  Desktop settings, such as wallpaper, screensavers, color schemes, and themes  Internet customizations, such as the homepage, favorites, and history  Application parameters and data, such as e-mail and upgrades  Personal files and folders, such as My Documents, My Pictures, and so on
  • 9. © Pearson Education Computer Forensics: Principles and Practices 9 Finding User Data and Profiles in Windows Folders (Cont.)  Some of the subfolders in the user root folder include:  Application data (hidden)  Cookies  Desktop  Favorites  Local Settings (hidden)  My Documents  NetHood (hidden)
  • 10. © Pearson Education Computer Forensics: Principles and Practices 10 Finding User Data and Profiles in Windows Folders (Cont.)
  • 11. © Pearson Education Computer Forensics: Principles and Practices 11 Location of User Root Folders Operating System (Platform) User Root Folder Location Windows 9x <partition>:WINDOWSProfilesuserid USER.DAT file Windows NT <partition>:WINNTProfilesuserid NTUSER.DAT file Windows 2000 and Windows XP <partition>:Documents and Settingsuserid NTUSER.DAT file Windows 7/8/10 <partition>:Usersuserid NTUser.DAT
  • 12. © Pearson Education Computer Forensics: Principles and Practices 12 Location of User Root Folders
  • 13. © Pearson Education Computer Forensics: Principles and Practices 13 In Practice: Temp Internet Files Provide Valuable E-Evidence
  • 14. © Pearson Education Computer Forensics: Principles and Practices 14 Investigating System Artifacts  Types of metadata  Descriptive: describes a resource for purposes such as discovery and identification  Structural: indicates how compound objects are put together  Administrative: provides information to help manage a resource, such as when it was created, last accessed, and modified
  • 15. © Pearson Education Computer Forensics: Principles and Practices 15 Investigating System Artifacts (Cont.)  Registry  Can reveal current and past applications, as well as programs that start automatically at bootup  Viewing the registry requires a registry editor  Event logs track system events  Application log tracks application events  Security log shows logon attempts  System log tracks events such as driver failures
  • 16. © Pearson Education Computer Forensics: Principles and Practices 16 Investigating System Artifacts (Cont.)  Swap file/page file  Used by the system as virtual memory  Can provide the investigator with a snapshot of volatile memory  Print spool  May contain enhanced metafiles of print jobs  Recycle Bin/Recycler  Stores files the user has deleted
  • 17. © Pearson Education Computer Forensics: Principles and Practices 17 Investigating System Artifacts (Cont.) - Thumbs.DB
  • 18. © Pearson Education Computer Forensics: Principles and Practices 18 Investigating System Artifacts (Cont.) - Print spool Select 41 bytes
  • 19. © Pearson Education Computer Forensics: Principles and Practices 19 Investigating System Artifacts (Cont.) - Print spool
  • 20. © Pearson Education Computer Forensics: Principles and Practices 20 Investigating System Artifacts (Cont.) - Recycle Bin/Recycler
  • 21. © Pearson Education Computer Forensics: Principles and Practices 21 Investigating System Artifacts (Cont.) – link files & recent used files
  • 22. © Pearson Education Computer Forensics: Principles and Practices 22 Investigating System Artifacts (Cont.) – Store points
  • 23. © Pearson Education Computer Forensics: Principles and Practices 23 Investigating System Artifacts (Cont.) – Logs Windows NT, 2000, XP maintain log files  System Log  Application Log  Security Log
  • 24. © Pearson Education Computer Forensics: Principles and Practices 24 Investigating System Artifacts (Cont.) – Logs Live System:  Use Event Viewer
  • 25. © Pearson Education Computer Forensics: Principles and Practices 25 Investigating System Artifacts (Cont.) – Logs Event Viewer  Event Viewer
  • 26. © Pearson Education Computer Forensics: Principles and Practices 26 Investigating System Artifacts (Cont.) – Logs from forensics duplicate (Windows/System32/Config/)  SecEvent.evt  AppEvent.evt  SysEvent.evt
  • 27. © Pearson Education Computer Forensics: Principles and Practices 27 Investigating System Artifacts (Cont.) – $ Logfile  $Logfile entry in the MFT contains the log of all file system transactions  Deletion of a file leaves several entries in $Logfile  Not unusual to find files that are no longer on the disk  Shows that file was used by the system
  • 28. © Pearson Education Computer Forensics: Principles and Practices 28 Investigating System Artifacts (Cont.) – Temporary Files  Temporary files  Files with extension tmp  Created by many applications  Emails with large attachments:  Attachments are probably stored as temp files. (Depends on email system.)  Look for file extensions .tmp
  • 29. © Pearson Education Computer Forensics: Principles and Practices 29 Investigating System Artifacts (Cont.) – Internet Explorer  Internet Explorer (as well as other browsers) use a cache.  index.dat contains internet explorer cached websites.
  • 30. © Pearson Education Computer Forensics: Principles and Practices 30 Investigating System Artifacts (Cont.) – Temporary Files
  • 31. © Pearson Education Computer Forensics: Principles and Practices 31 Investigating System Artifacts (Cont.) - Recycle Bin/Recycler
  • 32. © Pearson Education Computer Forensics: Principles and Practices 32 Investigating System Artifacts (Cont.) – Swap Files  Windows 2000 & WinXP & Above  Pagefile.sys  Windows 98  Win386.swp
  • 33. © Pearson Education Computer Forensics: Principles and Practices 33 Summary  Search times can be reduced through the use of default folders and operating system artifacts  The skill level of the user will determine whether this is an effective use of time in the case
  • 34. © Pearson Education Computer Forensics: Principles and Practices 34 34 Questions? Majdi.Owda@aaup.edu