SlideShare a Scribd company logo
1 of 10
Operating system Forensics
Importance of operating system forensics
• Ultimately, in a forensic examination, we are investigating the action of a Person
• Almost every event or action on a system is the result of a user either doing something
• Many events change the state of the Operating System (OS)
• OS Forensics helps understand how system changes correlate to events resulting from the
action of somebody in the real world
Goal: Extract and interpret data of investigative value from computers running Windows operating
systems
There are many versions of windows out there:
Some of the older versions are outdated and are no longer used: Windows 9x, NT, ME, 2000, XP
Windows boot sequence
Windows startup: Why relevant for forensics?
1. Interrupt the boot process to view and document the CMOS configuration
2. Explain which files were altered in the startup process
E.g., if an evidentiary system was accidentally booted, demonstrate that no user-created files were
modified
3. Determine which version of the OS was running and when was installed
4. Examine the startup process for signs of tampering
E.g., important when investigating malware
Startup in Windows NT and later
All NTFS computers perform the following steps when the computer is turned on:
Contamination concerns with Windows:
• When you start a Windows XP NTFS workstation, several files are accessed immediately
The last access date and time stamp for the files change to the current date and time.
• May destroy any potential evidence.
E.g., that shows when a Windows workstation was last used.
• Determining which files are changed upon startup and shutdown can be done using some
forensic tools.
Relevant Windows data structures:
NTFS
Windows Registry
Windows Event Log
Windows Registry:
The Registry is the heart and soul of Windows OSes and a wealth of information can be recovered:
• System configuration
• Devices on the system
• User names
• Personal settings and browser preferences
• Web browsing activity
• Files opened
• Programs executed
• Passwords
Registry access activity
• Virtually everything done in Windows refers to or is recorded into the Registry
The RegMon program can be used to display registry activity in real time
• Registry access barely remains idle: the registry is referenced in one way or another with
every action taken by the user
Windows Event Log
Whenever an event, such as a user logging on or off, occurs, the operating system logs the event.
An event can be any occurrence that the OS or a program wants to keep track of or alert the user
about.
Windows has a centralized log service to allow apps and OS to report events that have taken place:
• Application (example: Database message)
• System (example: driver failure)
• Security (example: Logon attempt, file access)
Example of detailed event tracking:
Detailed Event tracking can include the following events:
#528 – Successful Login (The user authenticate to the system)
#592 – A new process has been created (application is launched)
#560 – Object Open (a file is requested)
#567 – Object Access (the file is modified and saved)
#564 – Object Deleted
#562 – Handle Closed (the file has been closed)
#593 – A Process Has Exited (the application was terminated)
Windows artifacts of user activities:
Volatile information
• Open network connections
• Running processes
Non-volatile information
• Hidden files
• Slack space
• Swap files
• Index.dat files
• Windows Search index
• Unallocated clusters
• Unused partitions
• Hidden partitions
• Registry settings
• Windows event logs
Operating System Forensics Tool:
PassMark OSForensics:
PassMark OSForensics allows you to identify suspicious files and activity with hash matching,
drive signature comparisons, e-mails, memory and binary data.
It lets you extract forensic evidence from computers quickly with advanced file searching and
indexing and enables this data to be managed effectively.
Features
Discover Forensic Evidence Faster
• Find files faster, search by filename, size and time
• Search within file contents using the Zoom search engine
• Search through email archives from Outlook, ThunderBird, Mozilla and more
• Recover and search deleted files
• Uncover recent activity of website visits, downloads and logins
• Collect detailed system information
• Password recovery from web browsers, decryption of office documents
• Discover and reveal hidden areas in your hard disk
• Browse Volume Shadow copies to see past versions of files
Platforms:
Windows XP SP3, Vista, Win 7, Win 8, Win 10, Server 2000, 2003, 2008, 2012. Available for both
32-bit and 64-bit platforms.
Requirements:
Minimum 1GB of RAM. (4GB+ recommended)
200MB of free disk space, or can be run from USB drive
DEMO:
Scenario:
Artifact: Physical Pendrive (Transcend 8 GB Pendrive)
Software used: PassMark OSForensics
Goal:
1) To extract the image and do live forensics
2) Identify the deleted files and pictures used for committing cyber crime.
Fig1.0, PassMark OSForensics Dashboard
Fig 1.1, Create a New Case
Fig 1.2, Provide Case details and Target location for forensics image.
Fig 1.3, Target location created Successfully.
Fig 1.4, Select the option ‘Deleted File Search’ in the Dashboard.
Fig 1.5, Select the target partition i.e. Transcend Pendrive and click on Search as show in the figure.
Fig 1.6, Current files and folders
available inside the Artifact (Physical
Pendrive).
Fig 1.7,
Identified the
deleted files
and folders in
the Pendrive.
Fig 1.8, Analysing a deleted image file.
Fig 1.9, Analysing a deleted text document file.

More Related Content

What's hot

What's hot (20)

Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Module 02 ftk imager
Module 02 ftk imagerModule 02 ftk imager
Module 02 ftk imager
 
Virtual Machine Forensics
Virtual Machine ForensicsVirtual Machine Forensics
Virtual Machine Forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
LTEC 2013 - EnCase v7.08.01 presentation
LTEC 2013 - EnCase v7.08.01 presentation LTEC 2013 - EnCase v7.08.01 presentation
LTEC 2013 - EnCase v7.08.01 presentation
 
computer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software toolscomputer forensic tools-Hardware & Software tools
computer forensic tools-Hardware & Software tools
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
Memory forensics.pptx
Memory forensics.pptxMemory forensics.pptx
Memory forensics.pptx
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Cyber Forensics Overview
Cyber Forensics OverviewCyber Forensics Overview
Cyber Forensics Overview
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Data recovery
Data recoveryData recovery
Data recovery
 
Email investigation
Email investigationEmail investigation
Email investigation
 

Similar to Operating System Forensics

Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"EPAM Systems
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory ForensicsIIJ
 
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptx
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptxGroup#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptx
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptxAliHamza515454
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its roleSudeshna Basak
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfGnanavi2
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collectiongagan deep
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Rhydham Joshi
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Rhydham Joshi
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docxsmile790243
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
Functions of OS.ppt
 Functions of OS.ppt Functions of OS.ppt
Functions of OS.pptJunaidAkbar37
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNCERT
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012Rian Yulian
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistrySam Bowne
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're InfectedTripwire
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesJeff Stokes
 
unit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfunit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfRohitGautam261127
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libinlibinp
 

Similar to Operating System Forensics (20)

Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
 
Super Easy Memory Forensics
Super Easy Memory ForensicsSuper Easy Memory Forensics
Super Easy Memory Forensics
 
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptx
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptxGroup#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptx
Group#4 Ali-Hamza --Sufian abid-- umer naseem -- adeel akhtar.pptx
 
Computer forensics and its role
Computer forensics and its roleComputer forensics and its role
Computer forensics and its role
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
Examining computer and evidence collection
Examining computer and evidence collectionExamining computer and evidence collection
Examining computer and evidence collection
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1
 
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docxLecture 09 - Memory Forensics.pdfL E C T U R E  9  B Y .docx
Lecture 09 - Memory Forensics.pdfL E C T U R E 9 B Y .docx
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Functions of OS.ppt
 Functions of OS.ppt Functions of OS.ppt
Functions of OS.ppt
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensics
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
Windows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff StokesWindows 7 client performance talk - Jeff Stokes
Windows 7 client performance talk - Jeff Stokes
 
unit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfunit 2 confinement techniques.pdf
unit 2 confinement techniques.pdf
 
Computer forensics libin
Computer forensics   libinComputer forensics   libin
Computer forensics libin
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Operating System Forensics

  • 1. Operating system Forensics Importance of operating system forensics • Ultimately, in a forensic examination, we are investigating the action of a Person • Almost every event or action on a system is the result of a user either doing something • Many events change the state of the Operating System (OS) • OS Forensics helps understand how system changes correlate to events resulting from the action of somebody in the real world Goal: Extract and interpret data of investigative value from computers running Windows operating systems There are many versions of windows out there: Some of the older versions are outdated and are no longer used: Windows 9x, NT, ME, 2000, XP Windows boot sequence Windows startup: Why relevant for forensics? 1. Interrupt the boot process to view and document the CMOS configuration 2. Explain which files were altered in the startup process E.g., if an evidentiary system was accidentally booted, demonstrate that no user-created files were modified 3. Determine which version of the OS was running and when was installed 4. Examine the startup process for signs of tampering E.g., important when investigating malware Startup in Windows NT and later All NTFS computers perform the following steps when the computer is turned on:
  • 2. Contamination concerns with Windows: • When you start a Windows XP NTFS workstation, several files are accessed immediately The last access date and time stamp for the files change to the current date and time. • May destroy any potential evidence. E.g., that shows when a Windows workstation was last used. • Determining which files are changed upon startup and shutdown can be done using some forensic tools. Relevant Windows data structures: NTFS Windows Registry Windows Event Log Windows Registry: The Registry is the heart and soul of Windows OSes and a wealth of information can be recovered: • System configuration • Devices on the system • User names • Personal settings and browser preferences • Web browsing activity • Files opened • Programs executed • Passwords Registry access activity • Virtually everything done in Windows refers to or is recorded into the Registry The RegMon program can be used to display registry activity in real time
  • 3. • Registry access barely remains idle: the registry is referenced in one way or another with every action taken by the user Windows Event Log Whenever an event, such as a user logging on or off, occurs, the operating system logs the event. An event can be any occurrence that the OS or a program wants to keep track of or alert the user about. Windows has a centralized log service to allow apps and OS to report events that have taken place: • Application (example: Database message) • System (example: driver failure) • Security (example: Logon attempt, file access) Example of detailed event tracking: Detailed Event tracking can include the following events: #528 – Successful Login (The user authenticate to the system) #592 – A new process has been created (application is launched) #560 – Object Open (a file is requested) #567 – Object Access (the file is modified and saved) #564 – Object Deleted #562 – Handle Closed (the file has been closed) #593 – A Process Has Exited (the application was terminated) Windows artifacts of user activities: Volatile information • Open network connections • Running processes Non-volatile information • Hidden files • Slack space • Swap files • Index.dat files • Windows Search index • Unallocated clusters • Unused partitions • Hidden partitions • Registry settings • Windows event logs
  • 4. Operating System Forensics Tool: PassMark OSForensics: PassMark OSForensics allows you to identify suspicious files and activity with hash matching, drive signature comparisons, e-mails, memory and binary data. It lets you extract forensic evidence from computers quickly with advanced file searching and indexing and enables this data to be managed effectively. Features Discover Forensic Evidence Faster • Find files faster, search by filename, size and time • Search within file contents using the Zoom search engine • Search through email archives from Outlook, ThunderBird, Mozilla and more • Recover and search deleted files • Uncover recent activity of website visits, downloads and logins • Collect detailed system information • Password recovery from web browsers, decryption of office documents • Discover and reveal hidden areas in your hard disk • Browse Volume Shadow copies to see past versions of files Platforms: Windows XP SP3, Vista, Win 7, Win 8, Win 10, Server 2000, 2003, 2008, 2012. Available for both 32-bit and 64-bit platforms. Requirements: Minimum 1GB of RAM. (4GB+ recommended) 200MB of free disk space, or can be run from USB drive DEMO: Scenario: Artifact: Physical Pendrive (Transcend 8 GB Pendrive) Software used: PassMark OSForensics Goal: 1) To extract the image and do live forensics 2) Identify the deleted files and pictures used for committing cyber crime.
  • 6. Fig 1.1, Create a New Case
  • 7. Fig 1.2, Provide Case details and Target location for forensics image.
  • 8. Fig 1.3, Target location created Successfully. Fig 1.4, Select the option ‘Deleted File Search’ in the Dashboard.
  • 9. Fig 1.5, Select the target partition i.e. Transcend Pendrive and click on Search as show in the figure. Fig 1.6, Current files and folders available inside the Artifact (Physical Pendrive). Fig 1.7, Identified the deleted files and folders in the Pendrive.
  • 10. Fig 1.8, Analysing a deleted image file. Fig 1.9, Analysing a deleted text document file.