SlideShare a Scribd company logo
Dr. Syed Akhter Hossain
Spring 2017
 Windows Registry
◦ Structure
◦ Properties
◦ Examples
 Timeline Analysis
 Web Browsers
◦ Internet Explorer
◦ FireFox
 DOS
◦ config.sys & autoexec.bat
 Windows 3.0
◦ INI file
 Windows 3.1
◦ Start of the idea of a central repository
 Windows 95 and beyond
◦ Establishment and expansion of the registry
 Registry
◦ A database that stores hardware and software
configuration information, network connections, user
preferences, and setup information
 For investigative purposes, the Registry
can contain valuable evidence
 To view the Registry, you can use:
◦ Regedit (Registry Editor) program for Windows 9x systems
◦ Regedt32 for Windows 2000 and XP
 At the physical level
◦ Files called hives
◦ Located in: %SYSTEMROOT%System32config
 Keys (analogous to folders)
 Values (analogous to files)
 Hierarchy:
◦ Hives
 Keys
 Values
Hives
Key
Value
 HKEY_USERS – all loaded user data
 HKEY_CURRENT_USER – currently logged on user
(NTUSER.DAT)
 HKEY_LOCAL_MACHINE – array of software and
hardware settings
 HKEY_CURRENT_CONFIG – hardware and software
settings at start-up
 HKEY_CLASSES_ROOT – contains information about
application needs to be used to open files
Windows 7 Root Keys
Information that can be recovered
include:
◦ System Configuration
◦ Devices on the System
◦ User Names
◦ Personal Settings and Browser Preferences
◦ Web Browsing Activity
◦ Files Opened
◦ Programs Executed
◦ Passwords
 The Windows Registry utilizes a
alphanumeric combination to uniquely
identify a security principal or security
group.
 The Security ID (SID) is used to identify the
computer system.
 The Relative ID (RID) is used to identity the
specific user on the computer system.
 The SID appears as:
◦ S-1-5-21-927890586-3685698554-67682326-
1005
 SID (security identifier)
◦ Well-known SIDs
 SID: S-1-0 Name: Null Authority
 SID: S-1-5-2 Name: Network
◦ S-1-5-21-2553256115-2633344321-
4076599324-1006
 S string is SID
 1 revision number
 5 authority level (from 0 to 5)
 21-2553256115-2633344321-4076599324 - domain or
local computer identifier
 1006 RID – Relative identifier
 Local SAM resolves SID for locally
authenticated users (not domain users)
◦ Use recycle bin to check for owners
 Internet Explorer
◦ IE auto logon and password
◦ IE search terms
◦ IE settings
◦ Typed URLs
◦ Auto-complete passwords
A “Most Recently Used List” contains entries made due to specific actions
performed by the user. There are numerous MRU list locations throughout
various Registry keys.
These lists are maintained in case the user returns to them in the future.
Essentially, their function is similar to how the history and cookies act in a web
browser.
The RegRipper is an open-source application for extracting, correlating, and
displaying specific information from Registry hive files from the Windows NT
(2000, XP, 2003, Vista and 7) family of operating systems.
 Determined by booting into the BIOS
and comparing it with an external
source
◦ Radio Signal Clock or Time Server
 CMOS Clock
◦ Complementary Metal Oxide Semiconductor Chip
(CMOS)
◦ Accessed by most OS to determine the time
 Embedded within the file system or high level
file metadata
 Will take into account local time (or not!)
 Can confuse an investigation depending on
tool configuration and time zone
 Will ask for the time from the BIOS CMOS
 Programs will ask for the time from the OS
 They can bypass the OS and ask for the time
directly from the BIOS
 It’s important to check and understand
where a program gets its time details from.
 MS DOS time/date Format (FAT File System)
 Stored as local time
 Used for MAC information
 32 Bit Structure
◦ Seconds (5 bits from offset 0)
◦ Minutes (6 bits from offset 5)
◦ Hours (5 bits from offset 11)
◦ Days (5 bits from offset 16)
◦ Months (4 bits from offset 21)
◦ Years (7 bits from offset 25)
 64 bit number measuring the number of
100ns intervals since 00:00:00, 1st Jan, 1601
◦ 58,000 year lifetime
 Stored in the MFT – MAC
 32-bit value
 Number of seconds elapsed since
◦ 1st January 1970, 00:00:00 GMT
 Limit
◦ Monday, December 2nd, 2030 and 19:42:58 GMT
 Coordinated Universal Time (UTC)
◦ Effectively the same as GMT
 Modern OS calculate the difference
between local time and UTC and store
the time/date as UTC
 00 DB A2 F7 5C B1 C5 01 (Localtime)
◦ 127703177299680000
 00 7B B4 7E 7E B1 C5 01 (GMT)
◦ 127703321299680000
 Difference:
◦ 144,000,000,000
 Verify:
◦ 144,000,000,000 * 0.0000001 = 14,400
◦ 100 ns = 10 millionth of a second
◦ 3,600 s in 1 hour. 14,400 in 4 hours
◦ = 4 hours
 ME/XP/Vista/Windows 7
◦ HKEY_Local_Machine/System/Current
ControlSet/Control/TimeZoneInformation/Bias
 ActiveTimeBias
◦ Amount of time (+ or -) to add to UTC
◦ StandardName - Time Zone
No adjustment required
 The major browsers (most to least-used):
◦ Internet Explorer – 61.58%
◦ Mozilla Firefox – 24.23%
◦ Everything else! – 14.19% Hitslink.com – February 2010
Stores files used in displaying web pages (cache), tracking
pages visited (history) and automatic identification /
authentication (cookies, credentials)
• Viewed pages will retrieve its page code and embedded files (such
as graphics) from the hard drive rather than the server, so the page
loads faster (cache)
• Able to see a record of recently visited pages (history)
• No sign in again at sites that require it, or to specify preferences
again (cookies and credentials). Also cookies are used by the
visited site and other sites to track web browsing, which is a privacy
discussion on its own.
 For the subject's browsing history
(index.dat and the cache files themselves –
in subdirectories), use Windows Explorer to
look in
C:Documents and Settings<subject User’s ID>Local
SettingsTemporary Internet FilesContent.IE5
C:Users<subject User’sID>AppDataLocalMicrosoft
WindowsTemporary Internet FilesContent.IE5
 For the subject's browsing history
(index.dat without the cache files), use a
browser (NOT Windows Explorer) or
command prompt to look in
C:Documents and Settings<subject User’s
ID>Local SettingsHistoryHistory.IE5
Daily history:
MSHist01(start)YYYYMMDD(end)YYYYMMDD
Weekly history:
MSHist01(start)YYYYMMDD(end)YYYYMMDD
Start of header
Start of cache folder listing
Start of
record
Last modified timestamp
Last accessed timestamp
Start of
URL
Cached
file name
Start
of http
header
Start of user name
 In IE6, when you select Delete Files, the
cache files are deleted from the hard drive,
but the entries in index.dat are marked
“free” and NOT removed!
 IE7 & 8 is more thorough – Selecting Delete
Files removes both the files and the entries
in index.dat (although you can restore the
files themselves as they are not overwritten)
• InPrivate does make the forensic examiner’s job more
difficult by not recording items such as typed addresses,
visited links, and forms, queries and passwords entered,
including not recording the “host records” (URLS) in
index.dat. It also deletes the contents of Temporary
Internet Files when the “subject” exits the browsing session.
• However, items (such as the cached filename and page
header information) are still dutifully written to index.dat,
making it still possible for an investigator to infer where the
“subject” has been surfing.
 For cookies saved on the subject's hard drive
(individual cookie text files), use Windows
Explorer to look in
C:Documents and Settings<subject
User’s ID>Cookies
 Stores encrypted userIDs and passwords
(AutoComplete) in
HKCUSoftwareMicrosoftInternet
ExplorerIntelliForms SPW, and web
addresses in
HKLMSoftwareMicrosoftProtected
Storage System Provider<subject’s
user ID>
 Stores encrypted userIDs and passwords
(AutoComplete) in
HKCUSoftwareMicrosoftInternet
ExplorerIntelliFormsStorage2
 Encryption has been improved
 A tool that allows you to take a given
index.dat file and parse it into a readable
/ exportable format
 Available at
http://www.mandiant.com/webhistorian.ht
m
 Pasco is another tool for analysis of the
index.dat files, but this one also runs on
Unix, which is another environment where
you may be running other forensics tools
 Does basically the same operation as Web
Historian, outputting to delimited text
files that can be imported elsewhere
 From the command line (Unix or
Windows):
galleta <option> (filename)
 Option: -t (column delimiter – defaults
to tab)
 Use > to redirect output into a file
 IE PassView reads the stored Internet
Explorer credentials from the Windows
Registry and returns the website, userID
and password in columnar format
 Note that this will obtain the user
credentials, but not other autocomplete
information such as form fields
 You will have to run it on the subject's
computer – not a very good idea, so create
a (forensic) working copy and run it from
there
 Open source web browser
 Evolved from the Netscape Navigator web
browser
 Support for images, frames, SSL and
javascript
 Full disk cache support
 Firefox stores its history, downloads, form fields,
cookies, and Identification / Authentication files
in the same location:
C:Documents and Settings<subject User’s
ID>Application DataMozilla
FirefoxProfiles<seemingly random
characters>.default (Windows XP) or
C:Users<subject User’s
ID>AppDataLocalMozilla
FirefoxProfiles<seemingly random
characters>.default (Windows Vista, 7 and
2008)
 Firefox stores its cache files in a different
location:
C:Documents and Settings<subject User’s
ID>Local SettingsApplication
DataMozilla
FirefoxProfiles<seemingly random
characters>.defaultCache (Windows XP) or
C:Users<subject User’s
ID>AppDataLocalMozilla
FirefoxProfiles<seemingly random
characters>.defaultCache (Windows Vista,
7)
 Software library that implements a
transactional SQL Database Engine
 Used by Firefox to store information in the
files we discussed before
 Unlike with earlier Firefox versions, the text
in SQLite format can be read easily within
Firefox
 On Firefox, the cache information is
stored across 3 types of files: one (1)
cache map file, three (3) cache block files,
and as many additional cache data files as
required to store additional cache data
 In Firefox, the situation is skewed much
more in favor of the subject. Going to Tools
and selecting Clear Private Data deletes not
only the cache files, but handily removes
the cache map and cache block files, so
tying the files (assuming you could recover
them) to the cache map and blocks
becomes quite a bit more difficult
 Firefox gives you the option to save your
often-used userIDs and passwords that you
utilize to access websites
 Unfortunately for the forensic investigator,
the subject may specify a Master password,
which prevents access to all the other
passwords
 FireMaster cracks this master password,
allowing you to access the password list in
the browser or via FirePassword
 Used with or without the Master Password
(depending on if it’s been set) to see the
websites your subject visited and the
userIDs and passwords s/he used to get in
 Much quicker than FireMaster, as you either
don’t have a Master Password or have
already specified it!
WindowsRegistry.ppt

More Related Content

Similar to WindowsRegistry.ppt

Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
PoornimaGhodke3
 
SANS Windows Artifact Analysis 2012
SANS Windows Artifact Analysis 2012SANS Windows Artifact Analysis 2012
SANS Windows Artifact Analysis 2012
Rian Yulian
 
Oracle training-in-hyderabad
Oracle training-in-hyderabadOracle training-in-hyderabad
Oracle training-in-hyderabad
sreehari orienit
 
Extracting and analyzing browser,email and IM artifacts
Extracting and analyzing browser,email and IM artifactsExtracting and analyzing browser,email and IM artifacts
Extracting and analyzing browser,email and IM artifacts
Marco Alamanni
 
Windows Forensic 101
Windows Forensic 101Windows Forensic 101
Windows Forensic 101
Digit Oktavianto
 
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active Directory
Tammy Moncrief
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
Sam Bowne
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise Services
Sam Bowne
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise Services
Sam Bowne
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Windows registry forensics
Windows registry forensicsWindows registry forensics
Windows registry forensics
Taha İslam YILMAZ
 
April 29, 2018 Remember that you must enter the answers t.docx
April 29, 2018 Remember that you must enter the answers t.docxApril 29, 2018 Remember that you must enter the answers t.docx
April 29, 2018 Remember that you must enter the answers t.docx
tarifarmarie
 
Operation System
Operation SystemOperation System
Operation System
ROHINIPRIYA1997
 
Oracle forensics 101
Oracle forensics 101Oracle forensics 101
Oracle forensics 101fangjiafu
 
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
Sam Bowne
 
Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentals
Bimal Jain
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
rafiq123
 

Similar to WindowsRegistry.ppt (20)

Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
 
SANS Windows Artifact Analysis 2012
SANS Windows Artifact Analysis 2012SANS Windows Artifact Analysis 2012
SANS Windows Artifact Analysis 2012
 
Oracle training-in-hyderabad
Oracle training-in-hyderabadOracle training-in-hyderabad
Oracle training-in-hyderabad
 
Extracting and analyzing browser,email and IM artifacts
Extracting and analyzing browser,email and IM artifactsExtracting and analyzing browser,email and IM artifacts
Extracting and analyzing browser,email and IM artifacts
 
Windows Forensic 101
Windows Forensic 101Windows Forensic 101
Windows Forensic 101
 
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active Directory
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise Services
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise Services
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows registry forensics
Windows registry forensicsWindows registry forensics
Windows registry forensics
 
April 29, 2018 Remember that you must enter the answers t.docx
April 29, 2018 Remember that you must enter the answers t.docxApril 29, 2018 Remember that you must enter the answers t.docx
April 29, 2018 Remember that you must enter the answers t.docx
 
Operation System
Operation SystemOperation System
Operation System
 
File000125
File000125File000125
File000125
 
Oracle forensics 101
Oracle forensics 101Oracle forensics 101
Oracle forensics 101
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
 
Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentals
 
29041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-200329041329 interview-questions-for-server-2003
29041329 interview-questions-for-server-2003
 

More from AliAshraf68199

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
AliAshraf68199
 
Week1_2.ppt
Week1_2.pptWeek1_2.ppt
Week1_2.ppt
AliAshraf68199
 
digital Information BD.pptx
digital Information BD.pptxdigital Information BD.pptx
digital Information BD.pptx
AliAshraf68199
 
digital Information.pptx
digital Information.pptxdigital Information.pptx
digital Information.pptx
AliAshraf68199
 
digital10.pptx
digital10.pptxdigital10.pptx
digital10.pptx
AliAshraf68199
 
digital signatures10.pptx
digital signatures10.pptxdigital signatures10.pptx
digital signatures10.pptx
AliAshraf68199
 
digital signatures1.pptx
digital signatures1.pptxdigital signatures1.pptx
digital signatures1.pptx
AliAshraf68199
 
digital signatures.pptx
digital signatures.pptxdigital signatures.pptx
digital signatures.pptx
AliAshraf68199
 
module_14_digital_signatures (1).pptx
module_14_digital_signatures (1).pptxmodule_14_digital_signatures (1).pptx
module_14_digital_signatures (1).pptx
AliAshraf68199
 
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptxlecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
AliAshraf68199
 

More from AliAshraf68199 (10)

What is Digital Forensics.docx
What is Digital Forensics.docxWhat is Digital Forensics.docx
What is Digital Forensics.docx
 
Week1_2.ppt
Week1_2.pptWeek1_2.ppt
Week1_2.ppt
 
digital Information BD.pptx
digital Information BD.pptxdigital Information BD.pptx
digital Information BD.pptx
 
digital Information.pptx
digital Information.pptxdigital Information.pptx
digital Information.pptx
 
digital10.pptx
digital10.pptxdigital10.pptx
digital10.pptx
 
digital signatures10.pptx
digital signatures10.pptxdigital signatures10.pptx
digital signatures10.pptx
 
digital signatures1.pptx
digital signatures1.pptxdigital signatures1.pptx
digital signatures1.pptx
 
digital signatures.pptx
digital signatures.pptxdigital signatures.pptx
digital signatures.pptx
 
module_14_digital_signatures (1).pptx
module_14_digital_signatures (1).pptxmodule_14_digital_signatures (1).pptx
module_14_digital_signatures (1).pptx
 
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptxlecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
lecture-10---public-key-encryption-ind-cpa-ind-cca-elgamal-rsa.pptx
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 

WindowsRegistry.ppt

  • 1. Dr. Syed Akhter Hossain Spring 2017
  • 2.  Windows Registry ◦ Structure ◦ Properties ◦ Examples  Timeline Analysis  Web Browsers ◦ Internet Explorer ◦ FireFox
  • 3.
  • 4.  DOS ◦ config.sys & autoexec.bat  Windows 3.0 ◦ INI file  Windows 3.1 ◦ Start of the idea of a central repository  Windows 95 and beyond ◦ Establishment and expansion of the registry
  • 5.  Registry ◦ A database that stores hardware and software configuration information, network connections, user preferences, and setup information  For investigative purposes, the Registry can contain valuable evidence  To view the Registry, you can use: ◦ Regedit (Registry Editor) program for Windows 9x systems ◦ Regedt32 for Windows 2000 and XP
  • 6.  At the physical level ◦ Files called hives ◦ Located in: %SYSTEMROOT%System32config  Keys (analogous to folders)  Values (analogous to files)  Hierarchy: ◦ Hives  Keys  Values
  • 9.  HKEY_USERS – all loaded user data  HKEY_CURRENT_USER – currently logged on user (NTUSER.DAT)  HKEY_LOCAL_MACHINE – array of software and hardware settings  HKEY_CURRENT_CONFIG – hardware and software settings at start-up  HKEY_CLASSES_ROOT – contains information about application needs to be used to open files
  • 10.
  • 12. Information that can be recovered include: ◦ System Configuration ◦ Devices on the System ◦ User Names ◦ Personal Settings and Browser Preferences ◦ Web Browsing Activity ◦ Files Opened ◦ Programs Executed ◦ Passwords
  • 13.
  • 14.
  • 15.  The Windows Registry utilizes a alphanumeric combination to uniquely identify a security principal or security group.  The Security ID (SID) is used to identify the computer system.  The Relative ID (RID) is used to identity the specific user on the computer system.  The SID appears as: ◦ S-1-5-21-927890586-3685698554-67682326- 1005
  • 16.  SID (security identifier) ◦ Well-known SIDs  SID: S-1-0 Name: Null Authority  SID: S-1-5-2 Name: Network ◦ S-1-5-21-2553256115-2633344321- 4076599324-1006  S string is SID  1 revision number  5 authority level (from 0 to 5)  21-2553256115-2633344321-4076599324 - domain or local computer identifier  1006 RID – Relative identifier  Local SAM resolves SID for locally authenticated users (not domain users) ◦ Use recycle bin to check for owners
  • 17.
  • 18.  Internet Explorer ◦ IE auto logon and password ◦ IE search terms ◦ IE settings ◦ Typed URLs ◦ Auto-complete passwords
  • 19.
  • 20. A “Most Recently Used List” contains entries made due to specific actions performed by the user. There are numerous MRU list locations throughout various Registry keys. These lists are maintained in case the user returns to them in the future. Essentially, their function is similar to how the history and cookies act in a web browser.
  • 21.
  • 22.
  • 23. The RegRipper is an open-source application for extracting, correlating, and displaying specific information from Registry hive files from the Windows NT (2000, XP, 2003, Vista and 7) family of operating systems.
  • 24.
  • 25.  Determined by booting into the BIOS and comparing it with an external source ◦ Radio Signal Clock or Time Server  CMOS Clock ◦ Complementary Metal Oxide Semiconductor Chip (CMOS) ◦ Accessed by most OS to determine the time
  • 26.  Embedded within the file system or high level file metadata  Will take into account local time (or not!)  Can confuse an investigation depending on tool configuration and time zone  Will ask for the time from the BIOS CMOS
  • 27.  Programs will ask for the time from the OS  They can bypass the OS and ask for the time directly from the BIOS  It’s important to check and understand where a program gets its time details from.
  • 28.  MS DOS time/date Format (FAT File System)  Stored as local time  Used for MAC information  32 Bit Structure ◦ Seconds (5 bits from offset 0) ◦ Minutes (6 bits from offset 5) ◦ Hours (5 bits from offset 11) ◦ Days (5 bits from offset 16) ◦ Months (4 bits from offset 21) ◦ Years (7 bits from offset 25)
  • 29.  64 bit number measuring the number of 100ns intervals since 00:00:00, 1st Jan, 1601 ◦ 58,000 year lifetime  Stored in the MFT – MAC
  • 30.  32-bit value  Number of seconds elapsed since ◦ 1st January 1970, 00:00:00 GMT  Limit ◦ Monday, December 2nd, 2030 and 19:42:58 GMT
  • 31.  Coordinated Universal Time (UTC) ◦ Effectively the same as GMT  Modern OS calculate the difference between local time and UTC and store the time/date as UTC
  • 32.  00 DB A2 F7 5C B1 C5 01 (Localtime) ◦ 127703177299680000  00 7B B4 7E 7E B1 C5 01 (GMT) ◦ 127703321299680000  Difference: ◦ 144,000,000,000  Verify: ◦ 144,000,000,000 * 0.0000001 = 14,400 ◦ 100 ns = 10 millionth of a second ◦ 3,600 s in 1 hour. 14,400 in 4 hours ◦ = 4 hours
  • 33.  ME/XP/Vista/Windows 7 ◦ HKEY_Local_Machine/System/Current ControlSet/Control/TimeZoneInformation/Bias  ActiveTimeBias ◦ Amount of time (+ or -) to add to UTC ◦ StandardName - Time Zone
  • 35.
  • 36.
  • 37.
  • 38.  The major browsers (most to least-used): ◦ Internet Explorer – 61.58% ◦ Mozilla Firefox – 24.23% ◦ Everything else! – 14.19% Hitslink.com – February 2010
  • 39. Stores files used in displaying web pages (cache), tracking pages visited (history) and automatic identification / authentication (cookies, credentials) • Viewed pages will retrieve its page code and embedded files (such as graphics) from the hard drive rather than the server, so the page loads faster (cache) • Able to see a record of recently visited pages (history) • No sign in again at sites that require it, or to specify preferences again (cookies and credentials). Also cookies are used by the visited site and other sites to track web browsing, which is a privacy discussion on its own.
  • 40.  For the subject's browsing history (index.dat and the cache files themselves – in subdirectories), use Windows Explorer to look in C:Documents and Settings<subject User’s ID>Local SettingsTemporary Internet FilesContent.IE5 C:Users<subject User’sID>AppDataLocalMicrosoft WindowsTemporary Internet FilesContent.IE5
  • 41.  For the subject's browsing history (index.dat without the cache files), use a browser (NOT Windows Explorer) or command prompt to look in C:Documents and Settings<subject User’s ID>Local SettingsHistoryHistory.IE5 Daily history: MSHist01(start)YYYYMMDD(end)YYYYMMDD Weekly history: MSHist01(start)YYYYMMDD(end)YYYYMMDD
  • 42. Start of header Start of cache folder listing
  • 43. Start of record Last modified timestamp Last accessed timestamp Start of URL Cached file name Start of http header Start of user name
  • 44.  In IE6, when you select Delete Files, the cache files are deleted from the hard drive, but the entries in index.dat are marked “free” and NOT removed!  IE7 & 8 is more thorough – Selecting Delete Files removes both the files and the entries in index.dat (although you can restore the files themselves as they are not overwritten)
  • 45. • InPrivate does make the forensic examiner’s job more difficult by not recording items such as typed addresses, visited links, and forms, queries and passwords entered, including not recording the “host records” (URLS) in index.dat. It also deletes the contents of Temporary Internet Files when the “subject” exits the browsing session. • However, items (such as the cached filename and page header information) are still dutifully written to index.dat, making it still possible for an investigator to infer where the “subject” has been surfing.
  • 46.  For cookies saved on the subject's hard drive (individual cookie text files), use Windows Explorer to look in C:Documents and Settings<subject User’s ID>Cookies
  • 47.  Stores encrypted userIDs and passwords (AutoComplete) in HKCUSoftwareMicrosoftInternet ExplorerIntelliForms SPW, and web addresses in HKLMSoftwareMicrosoftProtected Storage System Provider<subject’s user ID>
  • 48.  Stores encrypted userIDs and passwords (AutoComplete) in HKCUSoftwareMicrosoftInternet ExplorerIntelliFormsStorage2  Encryption has been improved
  • 49.  A tool that allows you to take a given index.dat file and parse it into a readable / exportable format  Available at http://www.mandiant.com/webhistorian.ht m
  • 50.
  • 51.  Pasco is another tool for analysis of the index.dat files, but this one also runs on Unix, which is another environment where you may be running other forensics tools  Does basically the same operation as Web Historian, outputting to delimited text files that can be imported elsewhere
  • 52.
  • 53.  From the command line (Unix or Windows): galleta <option> (filename)  Option: -t (column delimiter – defaults to tab)  Use > to redirect output into a file
  • 54.  IE PassView reads the stored Internet Explorer credentials from the Windows Registry and returns the website, userID and password in columnar format  Note that this will obtain the user credentials, but not other autocomplete information such as form fields  You will have to run it on the subject's computer – not a very good idea, so create a (forensic) working copy and run it from there
  • 55.  Open source web browser  Evolved from the Netscape Navigator web browser  Support for images, frames, SSL and javascript  Full disk cache support
  • 56.  Firefox stores its history, downloads, form fields, cookies, and Identification / Authentication files in the same location: C:Documents and Settings<subject User’s ID>Application DataMozilla FirefoxProfiles<seemingly random characters>.default (Windows XP) or C:Users<subject User’s ID>AppDataLocalMozilla FirefoxProfiles<seemingly random characters>.default (Windows Vista, 7 and 2008)
  • 57.  Firefox stores its cache files in a different location: C:Documents and Settings<subject User’s ID>Local SettingsApplication DataMozilla FirefoxProfiles<seemingly random characters>.defaultCache (Windows XP) or C:Users<subject User’s ID>AppDataLocalMozilla FirefoxProfiles<seemingly random characters>.defaultCache (Windows Vista, 7)
  • 58.  Software library that implements a transactional SQL Database Engine  Used by Firefox to store information in the files we discussed before  Unlike with earlier Firefox versions, the text in SQLite format can be read easily within Firefox
  • 59.
  • 60.
  • 61.  On Firefox, the cache information is stored across 3 types of files: one (1) cache map file, three (3) cache block files, and as many additional cache data files as required to store additional cache data
  • 62.  In Firefox, the situation is skewed much more in favor of the subject. Going to Tools and selecting Clear Private Data deletes not only the cache files, but handily removes the cache map and cache block files, so tying the files (assuming you could recover them) to the cache map and blocks becomes quite a bit more difficult
  • 63.
  • 64.
  • 65.  Firefox gives you the option to save your often-used userIDs and passwords that you utilize to access websites  Unfortunately for the forensic investigator, the subject may specify a Master password, which prevents access to all the other passwords  FireMaster cracks this master password, allowing you to access the password list in the browser or via FirePassword
  • 66.  Used with or without the Master Password (depending on if it’s been set) to see the websites your subject visited and the userIDs and passwords s/he used to get in  Much quicker than FireMaster, as you either don’t have a Master Password or have already specified it!