SlideShare a Scribd company logo
Windows 8 Forensics
& Anti-Forensics
Mike Spalding
Twitter: @fatherofmaddog
<Insert Witty Job Title Here>
Disclaimer
Use this information at your own
risk!
I am not your lawyer, expert
witness, or your priest. If you use
this information while committing
a crime you have only yourself to
blame. Blame your parents for
anything else that feel that you did
not get/receive when you were a
kid.
Blah, blah, blah, blah, blah, blah!
Thank You’s
I need to thank a few people for
helping me with this. They helped
to shave time and effort on this.
Tyler Smith - @bobbyMcSmathers
Dave Normand – AccessData
Lt. Pete Martin – Yolo County DA’s
Office
• Pre Windows Vista
− Windows XP and before have more similar feel
when it comes to forensics; similar registries,
event IDs, similar folder files, etc
• Post Windows Vista
− Vista provided a significant change to the
environment, that from a forensic standpoint, XP
and Vista could almost be considered unrelated
to a certain degree.
• Some things have not changed; Registry –
Sam, System, Software
Just a quick Primer on Windows
Forensics over the years.
• Vista, Windows 7, Windows 8 …
− Very much an evolutionary process.
− For the most part few things have moved, but
many more things have added.
Brothers from another mother …
• My initial install was 7.6 Gb of 8.0 Gb
− Well that was not enough, I needed to load some
office files, adobe, and general office utilities.
• My secondary action added 10 Gb
− Windows then expanded to fill 17.2 Gb of the
18Gb (David Blain must work for MSFT)
• My third action was to add 12 Gb
− Finally, I had enough to have some nice
slackspace, 7.5 Gb out of 30Gb was left. Huh?
Windows 8 needs to lose some weight
Windows 8 - Brings New Features
• Features that matter to forensic investigators
− Pagefile and Swapfile functions
− Windows 8 to Go
− Windows 8 Bitlocker Updates
− Windows 8 Cloud Integration
− Windows 8 Thumbnail Caching
− Windows 8 PC Refresh
• The biggest concern to an investigator is the
data not present on the system
− i.e. Cloud Services scare the forensic person!
It’s a Dog eat Dog World!
Windows 8 – Pagefile & Swapfile
• Pagefile.sys
− Similar to Windows 7 and Vista
− One exception is that many apps are listed as a
“low priority” in the pagefile, this allows for more
system critical apps to run
• Swapfile.sys
− Tweaked to take advantage of “Immersive
Applications”
− Apps are flushed in to the swap file when
memory gets full, this allows for apps to open
immediately when not in use.
Windows 8 – I will take that 2 Go!
• Win8 to Go
− Makes the OS Portable
− Allows for the OS to be
operated from a USB
drive
− Allows for up to six USB
devices
*Military Service Dog not
included.
Windows 8 – BitLocker
• Microsoft Drive Encryption
− First bestowed to the world with Vista/Win 2008
− Is a whole disk encryption system; ie. While the
system is on the files are accessible.
• New Encryption Features
− Can be deployed with WinPE or MDT
− Can limit encryption to just used space (makes
slack space a nice place to search!  )
− Better Key Management for improved recovery,
yeah whatever!
Windows 8 – Skydrive
• Microsoft Skydrive Integration
− Always been available, but now integrated into
OS directly
− Corporate installs of Win 8 will most likely drop
this feature.
* On a surface
device, you can
view files, but
cannot move them
to the RT device
from Skydrive.
Windows 8 – All Thumbs
• In Win7 thumbs.db was replaced
− Thumbcache is used to store all thumbnails for the
operating system
− In addition Win8 has several thumbcache files.
Speculation is that this is to provide support for
touchpads.
• The thumbcache in Win8 is different from
Win7, so currently there are no forensic tools
that can decipher the thumbcache, yet.
Windows 8 – PC Refresh
• Win8 offers a feature called ‘PC Refresh’
− It allows for system files to be reinstalled, while not
effecting the user files located on the system
− You can choose to remove everything and it will quite
literally remove all files.
− This feature is completely automated and the user is
ask very limited questions.
− From a forensic standpoint, this means that things
will probably stay static for this release.
Windows 8 – PC Refresh
Windows 8 – File History Artifacts
• Win8 has the ability to have a File History
− This is not to be confused with a shadowcopy.
− This cannot be used on cloud services, but can be
used on virtual drives (anti-forensics ideas!!)
− A GPO can be used to have all File History stored to
a network location or server.
− Located at:
%user%AppDataLocalMicrosoftWindowsFil
eHistory
− If this folder does not exist, neither does File History.
Windows 8 – ESE Structured DB File
• Win8 has a database of filenames, locations,
and versions
− This is helpful during investigations. It can show
history of files, depicts movements of files, etc.
− This is used when the restore files wizard is used.
− This is a great resource for keyword searches or
targeted searches looking for a specific image or
filename in question.
− Can be parsed with tools like ESEDbViewer.
Windows 8 – My new best friend!
• Win8 utilizes an XML config file that stores
the following pieces of information:
− Username, Machine Name, Libraries, Exclude
Folders, Location of Config Files, Retention
Informaiton, Target Volume Details, Volume Letter,
GUID of Volume, Volume Type, UNC Paths, Target
Configuration files , and backup storage locations.
− This provides ample information if data is being
stored on a flash drive or portable media.
− This can be used to trace machine history in the
portable OS function.
Windows 8 – My new best friend!
Windows 8 – Backup Data
• Win8 does not encrypt Backup data
− With user history and backup data being made
available, we will see that we can multiple variants of
a file readily available.
− New files are deprecated using the system UTC time
as a counter.
− The deprecation allows for the restore wizard to
know which file to restore.
− Fortunately for us, it also allows for the investigator
to view files after the fact.
Windows 8 – Default to the hard drive
• Win8 will default to the local system if the
remote drive or cloud service is not available.
− If a remove resource is unavailable, the file is stored
locally on the desktop.
− When the remote resource is made available, the files
are synched and the local file remains on the system.
− The file is marked as deleted, but it just goes into
slackspace or freespace on the local system.
− Fortunately for us, it also allows for the investigator
to view files after the fact.
Windows 8 – Two are better than One
Windows 8 – New Registry Hives
• The windows registry is useful for
investigations. as it contains hardware
information, usernames & Passwords.
− Hardware Information; thumb drives.
− ID’s and Passwords
− Internet Query details
− Programs installed on the local host
− System Information
Windows 8 – New Registry Hives
• ELAM (Early Launch Anti-Malware)
− Contains information to file launch times.
− Has details specific to Windows Defender and AV
data.
− ELAM driver loads before all other processes,
designed to prevent bootloader malware.
• BBI Registry File (Used with Immersive
Applications)
− Leveraged for licensing specific to users and their
applications. Uses logged on user and time.
Windows 8 – Internet Explorer 10
• New IE 10 Features
− Flip Ahead or “fast forward”, allows for web pages to
be scrolled like book pages.
− This also sends browsing history to Microsoft, to
improve the flip ahead experience.
− Pin to start allows for the user to pin favorite
websites to the start screen as a tile.
− Implicit/Explicit Sharing allows users to send a link
(implicit) or content from a page (explicit)
Windows 8 – IE10
• New IE 10 Features -
Continued
− EPM: Enhanced
Protected Mode uses
randomized memory
addressing to thwart
against buffer overflows.
− Application Caching
speeds up website data
between immersive
applications and the
internet.
Windows 8 – Anti-Forensics
• Encryption – Yes the tried and true way of
keeping something from someone.
− For all intensive purposes no one would use
BitLocker to protect their data if anti-forensics was a
pivotal concern.
− In Most cases, someone will use a whole disk
encryption along with select file encryption.
− Many people worried about AF have started a
practice to encrypt the hard drive twice.
− Some have called into question the security of
TrueCrypt as a viable solution.
Windows 8 – Anti-Forensics
• Time Tampering – The practice of changing file
and folder dates and time.
− A number of tools are available to perform this
function. Tool remnants are usually an indicator that
tampering to the drive has happened.
• Disk Wiping– The practice of writing an entire
disk with 1s and 0s.
− This is very secure method to destroy evidence, but
often times it is viewed poorly in court.
Windows 8 – Anti-Forensics
• Throwing Chaffe: To lead the investigator in the
wrong direction. Time is usually something that
many investigators do not have much of.
Windows 8 – Anti-Forensics
• Disk Destruction –
When all else fails, use
some gasoline and fire
and destroy the
evidence.
Shameless Plug
Bsides Columbus
January 20th, 2014
Doctors Hospital West
Three Tracks
KeyNote Speakers:
Dave Kennedy
Jayson Street
Questions
& Comments
@fatherofmaddog

More Related Content

What's hot

Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
CTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
CTIN
 
Windows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCaseWindows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCase
Takahiro Haruyama
 
Computer Forensics &amp; Windows Registry
Computer Forensics &amp; Windows RegistryComputer Forensics &amp; Windows Registry
Computer Forensics &amp; Windows Registry
somutripathi
 
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_WindowsChetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
guest66dc5f
 
Trying to bottle the cloud forensic challenges with cloud computing
Trying to bottle the cloud   forensic challenges with cloud computingTrying to bottle the cloud   forensic challenges with cloud computing
Trying to bottle the cloud forensic challenges with cloud computing
Brent Muir
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 
Users guide-to-winfe
Users guide-to-winfeUsers guide-to-winfe
Users guide-to-winfe
Gol D Roger
 

What's hot (20)

Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Windows forensic
Windows forensicWindows forensic
Windows forensic
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0
 
WinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage ToolWinFE: The (Almost) Perfect Triage Tool
WinFE: The (Almost) Perfect Triage Tool
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
 
Linux Forensics
Linux ForensicsLinux Forensics
Linux Forensics
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Windows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCaseWindows Memory Forensic Analysis using EnCase
Windows Memory Forensic Analysis using EnCase
 
Computer Forensics &amp; Windows Registry
Computer Forensics &amp; Windows RegistryComputer Forensics &amp; Windows Registry
Computer Forensics &amp; Windows Registry
 
Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation Debian Linux as a Forensic Workstation
Debian Linux as a Forensic Workstation
 
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_WindowsChetan-Mining_Digital_Evidence_in_Microsoft_Windows
Chetan-Mining_Digital_Evidence_in_Microsoft_Windows
 
Trying to bottle the cloud forensic challenges with cloud computing
Trying to bottle the cloud   forensic challenges with cloud computingTrying to bottle the cloud   forensic challenges with cloud computing
Trying to bottle the cloud forensic challenges with cloud computing
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Live Memory Forensics on Android devices
Live Memory Forensics on Android devicesLive Memory Forensics on Android devices
Live Memory Forensics on Android devices
 
Ntfs forensics
Ntfs forensicsNtfs forensics
Ntfs forensics
 
(130105) #fitalk trends in d forensics (dec, 2012)
(130105) #fitalk   trends in d forensics (dec, 2012)(130105) #fitalk   trends in d forensics (dec, 2012)
(130105) #fitalk trends in d forensics (dec, 2012)
 
Users guide-to-winfe
Users guide-to-winfeUsers guide-to-winfe
Users guide-to-winfe
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 

Viewers also liked

G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
CTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
CTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
CTIN
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations Tools
Mandy Jenkins
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Basis Technology
 
July132000
July132000July132000
July132000
CTIN
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
CTIN
 

Viewers also liked (20)

Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)Facebook Forensics Toolkit(FFT)
Facebook Forensics Toolkit(FFT)
 
NTFS Forensics
NTFS Forensics NTFS Forensics
NTFS Forensics
 
G Infomgnt
G InfomgntG Infomgnt
G Infomgnt
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
Files and Folders in Windows 7
Files and Folders in Windows 7Files and Folders in Windows 7
Files and Folders in Windows 7
 
NTFS vs FAT
NTFS vs FATNTFS vs FAT
NTFS vs FAT
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
[OWASP-TR Mobil Güvenlik Çalıştayı 2015] Yalçın Çakmak - Social Media Apps Fo...
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...Using and Developing with Open Source Digital Forensics Software in Digital A...
Using and Developing with Open Source Digital Forensics Software in Digital A...
 
Windows nt istallation
Windows nt istallationWindows nt istallation
Windows nt istallation
 
Social Media for Investigations Tools
Social Media for Investigations ToolsSocial Media for Investigations Tools
Social Media for Investigations Tools
 
Citrix
CitrixCitrix
Citrix
 
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics PlatformAutopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
Autopsy 3: Free Open Source End-to-End Windows-based Digital Forensics Platform
 
Capturing forensics image
Capturing forensics imageCapturing forensics image
Capturing forensics image
 
July132000
July132000July132000
July132000
 
Level1 Part8 End Of The Day
Level1 Part8 End Of The DayLevel1 Part8 End Of The Day
Level1 Part8 End Of The Day
 
Installation of Joomla on Windows XP
Installation of Joomla on Windows XPInstallation of Joomla on Windows XP
Installation of Joomla on Windows XP
 
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian CarrierOSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
 
Ntfs forensics
Ntfs forensicsNtfs forensics
Ntfs forensics
 

Similar to Windows 8 Forensics & Anti Forensics

Windows 8 dddd (beekelaar)
Windows 8 dddd (beekelaar)Windows 8 dddd (beekelaar)
Windows 8 dddd (beekelaar)
hypervnu
 
File storageandbackupsystems
File storageandbackupsystemsFile storageandbackupsystems
File storageandbackupsystems
Micheline LeBlanc
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
Gnanavi2
 
Hdg explains swapfile.sys, hiberfil.sys and pagefile
Hdg explains   swapfile.sys, hiberfil.sys and pagefileHdg explains   swapfile.sys, hiberfil.sys and pagefile
Hdg explains swapfile.sys, hiberfil.sys and pagefile
Trường Tiền
 
Hdg explains swapfile.sys, hiberfil.sys and pagefile
Hdg explains   swapfile.sys, hiberfil.sys and pagefileHdg explains   swapfile.sys, hiberfil.sys and pagefile
Hdg explains swapfile.sys, hiberfil.sys and pagefile
Trường Tiền
 
Lecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file systemLecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file system
Alchemist095
 
Lamp
LampLamp
Lamp
Reka
 
Lamp1
Lamp1Lamp1
Lamp1
Reka
 

Similar to Windows 8 Forensics & Anti Forensics (20)

3170725_Unit-4.pptx
3170725_Unit-4.pptx3170725_Unit-4.pptx
3170725_Unit-4.pptx
 
Windows 8 dddd (beekelaar)
Windows 8 dddd (beekelaar)Windows 8 dddd (beekelaar)
Windows 8 dddd (beekelaar)
 
When disk utility fails to fix Mac OS X file system corruption issues
When disk utility fails to fix Mac OS X file system corruption issuesWhen disk utility fails to fix Mac OS X file system corruption issues
When disk utility fails to fix Mac OS X file system corruption issues
 
Linux Recovery
Linux RecoveryLinux Recovery
Linux Recovery
 
Lecture4 Windows System Artifacts.pptx
Lecture4 Windows System Artifacts.pptxLecture4 Windows System Artifacts.pptx
Lecture4 Windows System Artifacts.pptx
 
File storageandbackupsystems
File storageandbackupsystemsFile storageandbackupsystems
File storageandbackupsystems
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
computerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdfcomputerforensics-140529094816-phpapp01 (1).pdf
computerforensics-140529094816-phpapp01 (1).pdf
 
ppt ch10
ppt ch10ppt ch10
ppt ch10
 
Hdg explains swapfile.sys, hiberfil.sys and pagefile
Hdg explains   swapfile.sys, hiberfil.sys and pagefileHdg explains   swapfile.sys, hiberfil.sys and pagefile
Hdg explains swapfile.sys, hiberfil.sys and pagefile
 
Hdg explains swapfile.sys, hiberfil.sys and pagefile
Hdg explains   swapfile.sys, hiberfil.sys and pagefileHdg explains   swapfile.sys, hiberfil.sys and pagefile
Hdg explains swapfile.sys, hiberfil.sys and pagefile
 
Backups.pptx
Backups.pptxBackups.pptx
Backups.pptx
 
dataacquisition.pdf
dataacquisition.pdfdataacquisition.pdf
dataacquisition.pdf
 
Data Acquisition
Data AcquisitionData Acquisition
Data Acquisition
 
Ch 13
Ch 13Ch 13
Ch 13
 
Windows 7 project final
Windows 7 project finalWindows 7 project final
Windows 7 project final
 
Lecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file systemLecture 8 comp forensics 03 10-18 file system
Lecture 8 comp forensics 03 10-18 file system
 
Lamp
LampLamp
Lamp
 
Lamp1
Lamp1Lamp1
Lamp1
 
Lamp1
Lamp1Lamp1
Lamp1
 

More from Mike Spaulding

BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
Mike Spaulding
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
Mike Spaulding
 
PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015
Mike Spaulding
 

More from Mike Spaulding (11)

BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
BlackHat Presentation - Lies and Damn Lies: Getting past the Hype of Endpoint...
 
Redefining Security in the Cloud
Redefining Security in the CloudRedefining Security in the Cloud
Redefining Security in the Cloud
 
Attacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty YearsAttacking Automation: Hacking for the Next Fifty Years
Attacking Automation: Hacking for the Next Fifty Years
 
Building an AppSec Team Extended Cut
Building an AppSec Team Extended CutBuilding an AppSec Team Extended Cut
Building an AppSec Team Extended Cut
 
Policy Map
Policy MapPolicy Map
Policy Map
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
DNS Vulnerabilities
DNS VulnerabilitiesDNS Vulnerabilities
DNS Vulnerabilities
 
CMH Security Summit 2014 - InfoSec Warrior
CMH Security Summit 2014 - InfoSec WarriorCMH Security Summit 2014 - InfoSec Warrior
CMH Security Summit 2014 - InfoSec Warrior
 
PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015PaloAlto Ignite Conference 2015
PaloAlto Ignite Conference 2015
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Windows 8 Forensics & Anti Forensics

  • 1. Windows 8 Forensics & Anti-Forensics Mike Spalding Twitter: @fatherofmaddog <Insert Witty Job Title Here>
  • 2. Disclaimer Use this information at your own risk! I am not your lawyer, expert witness, or your priest. If you use this information while committing a crime you have only yourself to blame. Blame your parents for anything else that feel that you did not get/receive when you were a kid. Blah, blah, blah, blah, blah, blah!
  • 3. Thank You’s I need to thank a few people for helping me with this. They helped to shave time and effort on this. Tyler Smith - @bobbyMcSmathers Dave Normand – AccessData Lt. Pete Martin – Yolo County DA’s Office
  • 4. • Pre Windows Vista − Windows XP and before have more similar feel when it comes to forensics; similar registries, event IDs, similar folder files, etc • Post Windows Vista − Vista provided a significant change to the environment, that from a forensic standpoint, XP and Vista could almost be considered unrelated to a certain degree. • Some things have not changed; Registry – Sam, System, Software Just a quick Primer on Windows Forensics over the years.
  • 5. • Vista, Windows 7, Windows 8 … − Very much an evolutionary process. − For the most part few things have moved, but many more things have added. Brothers from another mother …
  • 6. • My initial install was 7.6 Gb of 8.0 Gb − Well that was not enough, I needed to load some office files, adobe, and general office utilities. • My secondary action added 10 Gb − Windows then expanded to fill 17.2 Gb of the 18Gb (David Blain must work for MSFT) • My third action was to add 12 Gb − Finally, I had enough to have some nice slackspace, 7.5 Gb out of 30Gb was left. Huh? Windows 8 needs to lose some weight
  • 7. Windows 8 - Brings New Features • Features that matter to forensic investigators − Pagefile and Swapfile functions − Windows 8 to Go − Windows 8 Bitlocker Updates − Windows 8 Cloud Integration − Windows 8 Thumbnail Caching − Windows 8 PC Refresh • The biggest concern to an investigator is the data not present on the system − i.e. Cloud Services scare the forensic person!
  • 8. It’s a Dog eat Dog World!
  • 9. Windows 8 – Pagefile & Swapfile • Pagefile.sys − Similar to Windows 7 and Vista − One exception is that many apps are listed as a “low priority” in the pagefile, this allows for more system critical apps to run • Swapfile.sys − Tweaked to take advantage of “Immersive Applications” − Apps are flushed in to the swap file when memory gets full, this allows for apps to open immediately when not in use.
  • 10. Windows 8 – I will take that 2 Go! • Win8 to Go − Makes the OS Portable − Allows for the OS to be operated from a USB drive − Allows for up to six USB devices *Military Service Dog not included.
  • 11. Windows 8 – BitLocker • Microsoft Drive Encryption − First bestowed to the world with Vista/Win 2008 − Is a whole disk encryption system; ie. While the system is on the files are accessible. • New Encryption Features − Can be deployed with WinPE or MDT − Can limit encryption to just used space (makes slack space a nice place to search!  ) − Better Key Management for improved recovery, yeah whatever!
  • 12. Windows 8 – Skydrive • Microsoft Skydrive Integration − Always been available, but now integrated into OS directly − Corporate installs of Win 8 will most likely drop this feature. * On a surface device, you can view files, but cannot move them to the RT device from Skydrive.
  • 13. Windows 8 – All Thumbs • In Win7 thumbs.db was replaced − Thumbcache is used to store all thumbnails for the operating system − In addition Win8 has several thumbcache files. Speculation is that this is to provide support for touchpads. • The thumbcache in Win8 is different from Win7, so currently there are no forensic tools that can decipher the thumbcache, yet.
  • 14. Windows 8 – PC Refresh • Win8 offers a feature called ‘PC Refresh’ − It allows for system files to be reinstalled, while not effecting the user files located on the system − You can choose to remove everything and it will quite literally remove all files. − This feature is completely automated and the user is ask very limited questions. − From a forensic standpoint, this means that things will probably stay static for this release.
  • 15. Windows 8 – PC Refresh
  • 16. Windows 8 – File History Artifacts • Win8 has the ability to have a File History − This is not to be confused with a shadowcopy. − This cannot be used on cloud services, but can be used on virtual drives (anti-forensics ideas!!) − A GPO can be used to have all File History stored to a network location or server. − Located at: %user%AppDataLocalMicrosoftWindowsFil eHistory − If this folder does not exist, neither does File History.
  • 17. Windows 8 – ESE Structured DB File • Win8 has a database of filenames, locations, and versions − This is helpful during investigations. It can show history of files, depicts movements of files, etc. − This is used when the restore files wizard is used. − This is a great resource for keyword searches or targeted searches looking for a specific image or filename in question. − Can be parsed with tools like ESEDbViewer.
  • 18. Windows 8 – My new best friend! • Win8 utilizes an XML config file that stores the following pieces of information: − Username, Machine Name, Libraries, Exclude Folders, Location of Config Files, Retention Informaiton, Target Volume Details, Volume Letter, GUID of Volume, Volume Type, UNC Paths, Target Configuration files , and backup storage locations. − This provides ample information if data is being stored on a flash drive or portable media. − This can be used to trace machine history in the portable OS function.
  • 19. Windows 8 – My new best friend!
  • 20. Windows 8 – Backup Data • Win8 does not encrypt Backup data − With user history and backup data being made available, we will see that we can multiple variants of a file readily available. − New files are deprecated using the system UTC time as a counter. − The deprecation allows for the restore wizard to know which file to restore. − Fortunately for us, it also allows for the investigator to view files after the fact.
  • 21. Windows 8 – Default to the hard drive • Win8 will default to the local system if the remote drive or cloud service is not available. − If a remove resource is unavailable, the file is stored locally on the desktop. − When the remote resource is made available, the files are synched and the local file remains on the system. − The file is marked as deleted, but it just goes into slackspace or freespace on the local system. − Fortunately for us, it also allows for the investigator to view files after the fact.
  • 22. Windows 8 – Two are better than One
  • 23. Windows 8 – New Registry Hives • The windows registry is useful for investigations. as it contains hardware information, usernames & Passwords. − Hardware Information; thumb drives. − ID’s and Passwords − Internet Query details − Programs installed on the local host − System Information
  • 24. Windows 8 – New Registry Hives • ELAM (Early Launch Anti-Malware) − Contains information to file launch times. − Has details specific to Windows Defender and AV data. − ELAM driver loads before all other processes, designed to prevent bootloader malware. • BBI Registry File (Used with Immersive Applications) − Leveraged for licensing specific to users and their applications. Uses logged on user and time.
  • 25. Windows 8 – Internet Explorer 10 • New IE 10 Features − Flip Ahead or “fast forward”, allows for web pages to be scrolled like book pages. − This also sends browsing history to Microsoft, to improve the flip ahead experience. − Pin to start allows for the user to pin favorite websites to the start screen as a tile. − Implicit/Explicit Sharing allows users to send a link (implicit) or content from a page (explicit)
  • 26. Windows 8 – IE10 • New IE 10 Features - Continued − EPM: Enhanced Protected Mode uses randomized memory addressing to thwart against buffer overflows. − Application Caching speeds up website data between immersive applications and the internet.
  • 27. Windows 8 – Anti-Forensics • Encryption – Yes the tried and true way of keeping something from someone. − For all intensive purposes no one would use BitLocker to protect their data if anti-forensics was a pivotal concern. − In Most cases, someone will use a whole disk encryption along with select file encryption. − Many people worried about AF have started a practice to encrypt the hard drive twice. − Some have called into question the security of TrueCrypt as a viable solution.
  • 28. Windows 8 – Anti-Forensics • Time Tampering – The practice of changing file and folder dates and time. − A number of tools are available to perform this function. Tool remnants are usually an indicator that tampering to the drive has happened. • Disk Wiping– The practice of writing an entire disk with 1s and 0s. − This is very secure method to destroy evidence, but often times it is viewed poorly in court.
  • 29. Windows 8 – Anti-Forensics • Throwing Chaffe: To lead the investigator in the wrong direction. Time is usually something that many investigators do not have much of.
  • 30. Windows 8 – Anti-Forensics • Disk Destruction – When all else fails, use some gasoline and fire and destroy the evidence.
  • 31. Shameless Plug Bsides Columbus January 20th, 2014 Doctors Hospital West Three Tracks KeyNote Speakers: Dave Kennedy Jayson Street