SlideShare a Scribd company logo
The (Almost) PerfectTriageTool
Brent Muir – 2014 Version 1.0
 Benefits ofWinFE
 History ofWinFE
 BuildingWinFE
 “Live”Vs. Booting
 UsingWinFE:
 EncryptionTesting
 Imaging
▪ RAM
▪ HDs
 Triage
2
 Ability to boot on all x86 devices regardless of OS
 Windows
 Linux
 OSX (requires optical drive)
 RunsWindows compatible tools
 The price is right
 Cost ofWindows OS licence
 Highly customisable
3
 BartPE (2003)
 Live version ofWindows based on XP/2003
 UtilisedWindows Presinstallation Environment (PE)
http://www.nu2.nu/pebuilder/screenshots/
4
 Microsoft (SysInternals) created first “official”
WinFE guide (2008)
 Highly modified OS
▪ No GUI interface, CMD based only
▪ Registry keys modified to not mount devices by default
▪ Basic functionality, required batch scripts or plenty of
DOS commands
▪ Based onVista, compatible with Windows 7
5
Shavers, B. (2010)
6
 WinBuilder -Windows PE building utility
 WinFE script created by Brett Shavers that
modified the same registry keys as SysInternals
instructions (2010)
 Retained GUI interface
 Write ProtectTool Management Console
(replacement Disk Manager)
7
http://winbuilder.net/screenshots
8
 Microsoft Windows (32bit or 64bit) ISO
 Provides the baseband core OS files
 Windows Automated Installation Kit (AIK)
 Provides Windows PE bootable image thatWinFE is based upon
 WIM (Windows Image) mounting tools
 WinBuilder withWinFE scripts
 Provides advanced interface features ofWinFE (desktop GUI
support, etc)
9
 Two modes for third-party applications:
 Run from RAM
▪ Stops end-users modifying installed programs
▪ Takes up more RAM when booting (if working with low-
specced PCs)
 Run from Disk
▪ Easier to update (no more recompiling the fullWIM)
10
11
 Steps to compile your own version ofWinFE:
1. InstallWindows AIK
2. Mount Windows 7 ISO and remember the drive letter
3. InstallWinBuilder and point it to the drive letter of the mounted ISO
4. Configure the scripts required throughWinBuilder (includingTweaks 
WinFE)
5. Prepare any third-party software you require on WinFE
6. Run the WinBuilder program and set desired options This should output a
WinFE ISO as well as the files necessary to copy to a USB dongle
7. Edit the Boot loader (BCD) to allow a maximum timeout and require user
input into selectingWinFE from a boot menu
8. Test the WinFE release to ensure that it is forensically sound
12
Slip streaming drivers intoWinFE requires 2 tools (AIK):
 Imagex - used to mount WIM
 located in C:Program FilesWindows AIKToolsx86Servicing
 DISM - used to install drivers
 located in C:Program FilesWindows AIKToolsx86Servicing
1. imagex /mountrw C:WinFETargetWin7PE_SEsourcesboot.wim 1 C:winFEmount
2. dism.exe /image:C:WinFEMount /add-driver /driver:"C:WinFEFiles to injectHaspHasp"
/recurse
3. imagex.exe /unmount /commit C:winFEmount
13
 In order to copy the WinFE files to a USBThumb Drive you must first prepare the
thumb drive so that it is clean and bootable. Follow these steps:
1. Plug-in USB thumb drive into computer
2. Start CMD
3. Start Diskpart (type: diskpart)
4. Select the relevant USB thumb drive (to see available drives, type: list disk) (to select disk
type: select disk #) - where # is the relevant disk number
5. Clean the USB thumb drive (type: clean)
6. Create a primary partition (type: create partition primary)
7. Set the USB thumb drive as bootable (type: active)
8. Format the USB thumb drive (type: format fs=NTFS quick label="WinFE")
9. Exit Diskpart (type: exit)
14
Live:
 The software onWinFE can also be run on a live system, w/o booting into
theWinFEOS (assuming portable apps).
 Conducting an encryption test
 Ability to image RAM, Disks, mounted encrypted partitions
 Tools can all be updated on the fly
Booting:
 Booting into theWinFE environment conforms to industry best practice
in that it maintains the forensic state of the hard drives within the
suspect’s computer.
15
 EnCase - v6 & v7 (requires licence
dongle and slip-streaming HASP
drivers)
 X-Ways /WinHex – all versions
(requires licence dongle)
 TrueCrypt
 FTK Imager
 VirtualBox
 Wireshark
 RegistryBrowser
 Volatility – standalone version
 All Nirsoft tools
 Many more
16
1. Power down computer
2. InsertWinFE USB device into suspects computer
3. Power on computer and enter the BIOS or UEFI
 While in the BIOS it is recommended to take note of the system’s date and time.
4. Once in the BIOS change the boot order to the WinFE USB device – this should
show up in the BIOS as a USB device (or choose the optical drive if booting
from CD)
5. Save the changes to the BIOS and let the computer reboot
6. The computer should now boot intoWinFE boot menu. 17
Write ProtectTool Management Console
 Mount / unmount physical drives attached to the computer
as read-only or read-write.
 Add custom drivers
(e.g. software RAID drivers)
18
19
 EncryptionTest
 HD / RAM Imaging
 Triage
20
 Windows
 Linux
 OSX
21
WINDOWS OS – CryptHunter (LE only)
1. Plug in the WinFE USB thumb drive into the suspect's computer
2. The WinFE USB drive should now be visible in Explorer (My
Computer). Browse to the directory titled "CryptHunter" and
double-click on the file called "crypthunter". This will begin the
encryption test.
3. If anything of note is discovered a pop-up box will appear
warning that encryption may be present.
22
23
LINUX OSes – quick and dirty
 Method 1 –Terminal
1. Open the terminal (console / konsole) and type
mount and hit enter (return)
2. This command will list all currently mounted drives
on the computer, look for the word "crypt“
24
 Method 2 –
System Monitor
25
MAC OSX – quick and dirty
 Method 1 – Identify FileVault
1. Browse to "Computer"  "Users". If the user
account has the following icon then "FileVault" is
enabled. FileVault encrypts all of the user's files.
26
 Method 2 – Activity Monitor
1. Other 3rd part encryption tools are available for Mac OSX. In
order to check if these encryption programs are running. Browse
to "Applications“  "Utilities"  "Activity Monitor“
2. Once the Activity Monitor is displayed use the drop-down menu
to select "All Processes“
3. Look for any process that includes the word "crypt". If any of the
processes mention the word "crypt" then it is likely that the
computer features encryption.
27
 Method 2 –
Activity Monitor
28
RAM:
 DumpIt
 Simple executable, puts output in same directory as EXE
 Has some issues with RAM larger than 8GB
 WinPMEM
 CMD based
 Supports RAM larger than 8GB
 Supports RAW & Crashdump formats
 FTK Imager
 GUI version only
 Supports RAW acquisition as well as Pagefile.sys & Hiberfil.sys
 Larger footprint than DumpIt & WinPMEM
HD:
 FTK Imager
29
RAM:
 FMEM
 Creates kernel mirror driver
 Then use dd commands to capture
HD:
 DD
 Built-in
 FTK Imager CLI
 Debian
 Ubuntu (x32 & x64)
 Fedora (x32 & x64)
30
RAM:
 OSXPMEM
 Supports up to and including 10.9.x
 Creates kernel mirror driver (must be extracted onto local
machine to run or from HFS+/exFAT partition)
 Supports Raw, Mach-O, and ELF formats
1. copy OSXPMem.tar.gz to local directory
2. tar xvf OSXPMem.tar.gz
3. ./osxpmem -h to give help
4. ./osxpmem memory.dump
31
HD:
 FTK Imager for Mac
 CLI only, no GUI
 Needs to be copied to local machine to run (or on
HFS+/exFAT partition)
 Mac OSX Forensic Imager
 Needs to be copied to local machine to run (or on
HFS+/exFAT partition)
32
1. Connect an external hard drive (via USB) to the
suspect's computer
2. Open "WinFEWrite ProtectTool Management
Console " and mount this new drive as read/write
 NOTE – if this is the first drive you are mounting in WinFE it will
be given the drive letter “C”
 This drive will now be visible inWindows Explorer
3. Open FTK Imager and image normally
33
 Even w/o X-Ways or EnCase dongles there
are a number of tools to facilitate triage of
devices
 Apple Bootcamp script allows HFS+
partitions to be seen throughWinFE w/o third
party tools
34
 XnView:
 Graphic files
 Recursively look at directories
 Tag files  create reports
35
 XnView
36
 Nirsoft SearchMyFiles
 Keyword searching
 Advanced Filtering:
▪ Date range
▪ File type
▪ File size
 Context search (binary or text)
 Identify encrypted files
 Identify duplicates
 Create reports (CSV, HTML)
37
 Nirsoft
SearchMyFiles
38
 Email viewing programs:
 MiTec MailView
▪ DBX, MBX, EML,Thunderbird DB
 Kernel Exchange EDBViewer
▪ EDB, STM
 Kernel OSTViewer
▪ OST
 Kernel Outlook PSTViewer
▪ PST
 Windows MBOXViewer
▪ MBOX
39
 SQLite
 SQLite DB Browser
 SQLiteQ
 Microsoft ESE/EDB/JET Blue DB files
 Nirsoft ESEDatabaseView
40
 Web browser history
 Nirsoft BrowsingHistoryView
▪ IE (including 10/11), Firefox, Chrome, Safari
 Windows Registry
 LockAnd Code RegistryBrowser
▪ Mount the suspect's drive as read-only usingWrite Protect
Tool first
41
42
 Larson,T. (2008) “HowTo BuildWindows FEWithThe
Windows Preinstallation Environment 2.1”, SysInternals,
Microsoft Law Enforcement Portal
 Shavers, B. (2010) “The (Nearly) Perfect Forensic Boot CD”,
URL: http://www.forensicfocus.com/downloads/WinFE.pdf
43
 CryptHunter (LE only) - http://www.cert.org/digital-intelligence/tools/crypthunter.cfm?
 Kernel Data Recovery Tools - http://www.nucleustechnologies.com/
 MiTeC (MailView, SQLiteQ) - http://www.mitec.cz
 Nirsoft Suite - http://nirsoft.net/
 RegistryBrowser - https://lockandcode.com/software/registry_browser
 SQLite Database Browser - http://sourceforge.net/projects/sqlitebrowser/
 WinBuilder - http://reboot.pro/files/file/4-winbuilder/
 Windows Assessment and Deployment Kit (Windows ADK) - http://www.microsoft.com/en-us/download/details.aspx?id=39982&751be11f-
ede8-5a0c-058c-2ee190a24fa6=True
 Windows Automated Installation Kit (Windows AIK) - http://www.microsoft.com/en-au/download/details.aspx?id=5753
 Windows MBOX Viewer - http://sourceforge.net/projects/mbox-viewer/
 WinFE Blog (Brett Shavers) - http://winfe.wordpress.com/
 XnView - http://www.xnview.com/en/ 44

More Related Content

What's hot

Rootkit
RootkitRootkit
Rootkit
tech2click
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
Priya Manik
 
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsMemory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Jared Greenhill
 
CNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic DuplicationCNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic Duplication
Sam Bowne
 
Domino server controller domino console
Domino server controller   domino consoleDomino server controller   domino console
Domino server controller domino consolerchavero
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011CTIN
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows SystemConferencias FIST
 
Windows Forensic 101
Windows Forensic 101Windows Forensic 101
Windows Forensic 101
Digit Oktavianto
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
Anshul Tayal
 
Lesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and LibrariesLesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and LibrariesGene Carboni
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
Vidoushi B-Somrah
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
Chiawei Wang
 
A History of Linux
A History of LinuxA History of Linux
A History of Linux
Damian T. Gordon
 
Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdfBypass_AV-EDR.pdf
Bypass_AV-EDR.pdf
Farouk2nd
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
Manu Mathew Cherian
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Shreya Singireddy
 
Windows internals
Windows internalsWindows internals
Windows internals
Piyush Jain
 
The Forensic Lab
The Forensic LabThe Forensic Lab
The Forensic Lab
primeteacher32
 
Solution Manager Technical Monitoring - SAP BOBJ BI 4.0 (Part 3 of 3 - Manage...
Solution Manager Technical Monitoring - SAP BOBJ BI 4.0 (Part 3 of 3 - Manage...Solution Manager Technical Monitoring - SAP BOBJ BI 4.0 (Part 3 of 3 - Manage...
Solution Manager Technical Monitoring - SAP BOBJ BI 4.0 (Part 3 of 3 - Manage...
Linh Nguyen
 

What's hot (20)

Rootkit
RootkitRootkit
Rootkit
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced ActorsMemory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
 
CNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic DuplicationCNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic Duplication
 
Domino server controller domino console
Domino server controller   domino consoleDomino server controller   domino console
Domino server controller domino console
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
 
Windows Forensic 101
Windows Forensic 101Windows Forensic 101
Windows Forensic 101
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Lesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and LibrariesLesson 4 - Managing Applications, Services, Folders, and Libraries
Lesson 4 - Managing Applications, Services, Folders, and Libraries
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
A History of Linux
A History of LinuxA History of Linux
A History of Linux
 
Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdfBypass_AV-EDR.pdf
Bypass_AV-EDR.pdf
 
Cyber Forensics Module 2
Cyber Forensics Module 2Cyber Forensics Module 2
Cyber Forensics Module 2
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Windows internals
Windows internalsWindows internals
Windows internals
 
The Forensic Lab
The Forensic LabThe Forensic Lab
The Forensic Lab
 
Solution Manager Technical Monitoring - SAP BOBJ BI 4.0 (Part 3 of 3 - Manage...
Solution Manager Technical Monitoring - SAP BOBJ BI 4.0 (Part 3 of 3 - Manage...Solution Manager Technical Monitoring - SAP BOBJ BI 4.0 (Part 3 of 3 - Manage...
Solution Manager Technical Monitoring - SAP BOBJ BI 4.0 (Part 3 of 3 - Manage...
 
Windows file system
Windows file systemWindows file system
Windows file system
 

Viewers also liked

Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityCTIN
 
Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0
Brent Muir
 
Edrm
EdrmEdrm
EdrmCTIN
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drivesCTIN
 
2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public
Sandro Suffert
 
Vista Forensics
Vista ForensicsVista Forensics
Vista ForensicsCTIN
 
Introduction to memory forensics
Introduction to memory forensicsIntroduction to memory forensics
Introduction to memory forensics
Marco Alamanni
 
Become an Internet Sleuth!
Become an Internet Sleuth!Become an Internet Sleuth!
Become an Internet Sleuth!
Nearpod
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3CTIN
 
File carving tools
File carving toolsFile carving tools
File carving tools
Marco Alamanni
 
Raidprep
RaidprepRaidprep
RaidprepCTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3CTIN
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
Yansi Keim
 
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian CarrierOSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
Basis Technology
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector ConcernsCTIN
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registrysomutripathi
 
File system
File systemFile system
File system
Harleen Johal
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
Case IQ
 
Installation of Joomla on Windows XP
Installation of Joomla on Windows XPInstallation of Joomla on Windows XP
Installation of Joomla on Windows XP
Rupesh Kumar
 
Mac Forensics
Mac ForensicsMac Forensics
Mac ForensicsCTIN
 

Viewers also liked (20)

Translating Geek To Attorneys It Security
Translating Geek To Attorneys It SecurityTranslating Geek To Attorneys It Security
Translating Geek To Attorneys It Security
 
Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0
 
Edrm
EdrmEdrm
Edrm
 
Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public2010 2013 sandro suffert memory forensics introdutory work shop - public
2010 2013 sandro suffert memory forensics introdutory work shop - public
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Introduction to memory forensics
Introduction to memory forensicsIntroduction to memory forensics
Introduction to memory forensics
 
Become an Internet Sleuth!
Become an Internet Sleuth!Become an Internet Sleuth!
Become an Internet Sleuth!
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
File carving tools
File carving toolsFile carving tools
File carving tools
 
Raidprep
RaidprepRaidprep
Raidprep
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Forensic Anaysis on Twitter
Forensic Anaysis on TwitterForensic Anaysis on Twitter
Forensic Anaysis on Twitter
 
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian CarrierOSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
OSDF 2013 - Autopsy 3: Extensible Desktop Forensics by Brian Carrier
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Computer Forensics & Windows Registry
Computer Forensics & Windows RegistryComputer Forensics & Windows Registry
Computer Forensics & Windows Registry
 
File system
File systemFile system
File system
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Installation of Joomla on Windows XP
Installation of Joomla on Windows XPInstallation of Joomla on Windows XP
Installation of Joomla on Windows XP
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 

Similar to WinFE: The (Almost) Perfect Triage Tool

Windows Embedded in the Real World
Windows Embedded in the Real WorldWindows Embedded in the Real World
Windows Embedded in the Real World
ukdpe
 
2.Accessing the Pi
2.Accessing the Pi2.Accessing the Pi
2.Accessing the Pi
Mayank Joneja
 
Building
BuildingBuilding
Building
Satpal Parmar
 
Lec9chap8f04
Lec9chap8f04Lec9chap8f04
Lec9chap8f04
screaminc
 
Linux kernel booting
Linux kernel bootingLinux kernel booting
Linux kernel booting
Ramin Farajpour Cami
 
Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...
Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...
Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...
Nicolas Collery
 
U Boot or Universal Bootloader
U Boot or Universal BootloaderU Boot or Universal Bootloader
U Boot or Universal Bootloader
Satpal Parmar
 
Embedding Linux On The Encore Simputer
Embedding Linux On The Encore SimputerEmbedding Linux On The Encore Simputer
Embedding Linux On The Encore Simputer
Satpal Parmar
 
Android memory analysis Debug slides.pdf
Android memory analysis Debug slides.pdfAndroid memory analysis Debug slides.pdf
Android memory analysis Debug slides.pdf
VishalKumarJha10
 
Windows 8 Client Part 1 "The OS internals for IT-Pro's"
Windows 8 Client Part 1 "The OS internals for IT-Pro's"Windows 8 Client Part 1 "The OS internals for IT-Pro's"
Windows 8 Client Part 1 "The OS internals for IT-Pro's"
Microsoft TechNet - Belgium and Luxembourg
 
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告fm2008
 
101 1.1 hardware settings v2
101 1.1 hardware settings v2101 1.1 hardware settings v2
101 1.1 hardware settings v2
Acácio Oliveira
 
BITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installationBITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installation
BITS
 
os.ppt
os.pptos.ppt
os.ppt
banu236831
 
Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentals
Bimal Jain
 
1.1 hardware settings v2
1.1 hardware settings v21.1 hardware settings v2
1.1 hardware settings v2
Acácio Oliveira
 

Similar to WinFE: The (Almost) Perfect Triage Tool (20)

Windows Embedded in the Real World
Windows Embedded in the Real WorldWindows Embedded in the Real World
Windows Embedded in the Real World
 
windows.pptx
windows.pptxwindows.pptx
windows.pptx
 
2.Accessing the Pi
2.Accessing the Pi2.Accessing the Pi
2.Accessing the Pi
 
Building
BuildingBuilding
Building
 
Lec9chap8f04
Lec9chap8f04Lec9chap8f04
Lec9chap8f04
 
Linux kernel booting
Linux kernel bootingLinux kernel booting
Linux kernel booting
 
Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...
Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...
Needle In An Encrypted Haystack: Forensics in a hardened environment (with Fu...
 
Embedded project
Embedded projectEmbedded project
Embedded project
 
U Boot or Universal Bootloader
U Boot or Universal BootloaderU Boot or Universal Bootloader
U Boot or Universal Bootloader
 
Embedding Linux On The Encore Simputer
Embedding Linux On The Encore SimputerEmbedding Linux On The Encore Simputer
Embedding Linux On The Encore Simputer
 
Linux
LinuxLinux
Linux
 
Android memory analysis Debug slides.pdf
Android memory analysis Debug slides.pdfAndroid memory analysis Debug slides.pdf
Android memory analysis Debug slides.pdf
 
Windows 8 Client Part 1 "The OS internals for IT-Pro's"
Windows 8 Client Part 1 "The OS internals for IT-Pro's"Windows 8 Client Part 1 "The OS internals for IT-Pro's"
Windows 8 Client Part 1 "The OS internals for IT-Pro's"
 
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
Aix5[1].3+hacmp+oracle9 i+weblogic8.1安装实施报告
 
101 1.1 hardware settings v2
101 1.1 hardware settings v2101 1.1 hardware settings v2
101 1.1 hardware settings v2
 
BITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installationBITS: Introduction to linux, distributions and installation
BITS: Introduction to linux, distributions and installation
 
os.ppt
os.pptos.ppt
os.ppt
 
groupProject-1-Win8
groupProject-1-Win8groupProject-1-Win8
groupProject-1-Win8
 
Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentals
 
1.1 hardware settings v2
1.1 hardware settings v21.1 hardware settings v2
1.1 hardware settings v2
 

More from Brent Muir

Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
Brent Muir
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
Brent Muir
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
Brent Muir
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5
Brent Muir
 
Ducky USB - Indicators of Compromise (IOCs)
Ducky USB - Indicators of Compromise (IOCs)Ducky USB - Indicators of Compromise (IOCs)
Ducky USB - Indicators of Compromise (IOCs)
Brent Muir
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
Brent Muir
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
Brent Muir
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
Brent Muir
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
Brent Muir
 
Malware SPAM - March 2013
Malware SPAM - March 2013Malware SPAM - March 2013
Malware SPAM - March 2013
Brent Muir
 
Windows RT Evidentiary Artefacts 1.0
Windows RT Evidentiary Artefacts 1.0Windows RT Evidentiary Artefacts 1.0
Windows RT Evidentiary Artefacts 1.0
Brent Muir
 
Malware Spam February 2013
Malware Spam February 2013Malware Spam February 2013
Malware Spam February 2013
Brent Muir
 
Malware SPAM - January 2013
Malware SPAM - January 2013Malware SPAM - January 2013
Malware SPAM - January 2013
Brent Muir
 
Trying to bottle the cloud forensic challenges with cloud computing
Trying to bottle the cloud   forensic challenges with cloud computingTrying to bottle the cloud   forensic challenges with cloud computing
Trying to bottle the cloud forensic challenges with cloud computingBrent Muir
 

More from Brent Muir (14)

Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS Defending Against the Dark Arts of LOLBINS
Defending Against the Dark Arts of LOLBINS
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5
 
Ducky USB - Indicators of Compromise (IOCs)
Ducky USB - Indicators of Compromise (IOCs)Ducky USB - Indicators of Compromise (IOCs)
Ducky USB - Indicators of Compromise (IOCs)
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
 
Denial of Service Attacks
Denial of Service AttacksDenial of Service Attacks
Denial of Service Attacks
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
TOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying MarkersTOR Packet Analysis - Locating Identifying Markers
TOR Packet Analysis - Locating Identifying Markers
 
Malware SPAM - March 2013
Malware SPAM - March 2013Malware SPAM - March 2013
Malware SPAM - March 2013
 
Windows RT Evidentiary Artefacts 1.0
Windows RT Evidentiary Artefacts 1.0Windows RT Evidentiary Artefacts 1.0
Windows RT Evidentiary Artefacts 1.0
 
Malware Spam February 2013
Malware Spam February 2013Malware Spam February 2013
Malware Spam February 2013
 
Malware SPAM - January 2013
Malware SPAM - January 2013Malware SPAM - January 2013
Malware SPAM - January 2013
 
Trying to bottle the cloud forensic challenges with cloud computing
Trying to bottle the cloud   forensic challenges with cloud computingTrying to bottle the cloud   forensic challenges with cloud computing
Trying to bottle the cloud forensic challenges with cloud computing
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 

WinFE: The (Almost) Perfect Triage Tool

  • 1. The (Almost) PerfectTriageTool Brent Muir – 2014 Version 1.0
  • 2.  Benefits ofWinFE  History ofWinFE  BuildingWinFE  “Live”Vs. Booting  UsingWinFE:  EncryptionTesting  Imaging ▪ RAM ▪ HDs  Triage 2
  • 3.  Ability to boot on all x86 devices regardless of OS  Windows  Linux  OSX (requires optical drive)  RunsWindows compatible tools  The price is right  Cost ofWindows OS licence  Highly customisable 3
  • 4.  BartPE (2003)  Live version ofWindows based on XP/2003  UtilisedWindows Presinstallation Environment (PE) http://www.nu2.nu/pebuilder/screenshots/ 4
  • 5.  Microsoft (SysInternals) created first “official” WinFE guide (2008)  Highly modified OS ▪ No GUI interface, CMD based only ▪ Registry keys modified to not mount devices by default ▪ Basic functionality, required batch scripts or plenty of DOS commands ▪ Based onVista, compatible with Windows 7 5
  • 7.  WinBuilder -Windows PE building utility  WinFE script created by Brett Shavers that modified the same registry keys as SysInternals instructions (2010)  Retained GUI interface  Write ProtectTool Management Console (replacement Disk Manager) 7
  • 9.  Microsoft Windows (32bit or 64bit) ISO  Provides the baseband core OS files  Windows Automated Installation Kit (AIK)  Provides Windows PE bootable image thatWinFE is based upon  WIM (Windows Image) mounting tools  WinBuilder withWinFE scripts  Provides advanced interface features ofWinFE (desktop GUI support, etc) 9
  • 10.  Two modes for third-party applications:  Run from RAM ▪ Stops end-users modifying installed programs ▪ Takes up more RAM when booting (if working with low- specced PCs)  Run from Disk ▪ Easier to update (no more recompiling the fullWIM) 10
  • 11. 11
  • 12.  Steps to compile your own version ofWinFE: 1. InstallWindows AIK 2. Mount Windows 7 ISO and remember the drive letter 3. InstallWinBuilder and point it to the drive letter of the mounted ISO 4. Configure the scripts required throughWinBuilder (includingTweaks  WinFE) 5. Prepare any third-party software you require on WinFE 6. Run the WinBuilder program and set desired options This should output a WinFE ISO as well as the files necessary to copy to a USB dongle 7. Edit the Boot loader (BCD) to allow a maximum timeout and require user input into selectingWinFE from a boot menu 8. Test the WinFE release to ensure that it is forensically sound 12
  • 13. Slip streaming drivers intoWinFE requires 2 tools (AIK):  Imagex - used to mount WIM  located in C:Program FilesWindows AIKToolsx86Servicing  DISM - used to install drivers  located in C:Program FilesWindows AIKToolsx86Servicing 1. imagex /mountrw C:WinFETargetWin7PE_SEsourcesboot.wim 1 C:winFEmount 2. dism.exe /image:C:WinFEMount /add-driver /driver:"C:WinFEFiles to injectHaspHasp" /recurse 3. imagex.exe /unmount /commit C:winFEmount 13
  • 14.  In order to copy the WinFE files to a USBThumb Drive you must first prepare the thumb drive so that it is clean and bootable. Follow these steps: 1. Plug-in USB thumb drive into computer 2. Start CMD 3. Start Diskpart (type: diskpart) 4. Select the relevant USB thumb drive (to see available drives, type: list disk) (to select disk type: select disk #) - where # is the relevant disk number 5. Clean the USB thumb drive (type: clean) 6. Create a primary partition (type: create partition primary) 7. Set the USB thumb drive as bootable (type: active) 8. Format the USB thumb drive (type: format fs=NTFS quick label="WinFE") 9. Exit Diskpart (type: exit) 14
  • 15. Live:  The software onWinFE can also be run on a live system, w/o booting into theWinFEOS (assuming portable apps).  Conducting an encryption test  Ability to image RAM, Disks, mounted encrypted partitions  Tools can all be updated on the fly Booting:  Booting into theWinFE environment conforms to industry best practice in that it maintains the forensic state of the hard drives within the suspect’s computer. 15
  • 16.  EnCase - v6 & v7 (requires licence dongle and slip-streaming HASP drivers)  X-Ways /WinHex – all versions (requires licence dongle)  TrueCrypt  FTK Imager  VirtualBox  Wireshark  RegistryBrowser  Volatility – standalone version  All Nirsoft tools  Many more 16
  • 17. 1. Power down computer 2. InsertWinFE USB device into suspects computer 3. Power on computer and enter the BIOS or UEFI  While in the BIOS it is recommended to take note of the system’s date and time. 4. Once in the BIOS change the boot order to the WinFE USB device – this should show up in the BIOS as a USB device (or choose the optical drive if booting from CD) 5. Save the changes to the BIOS and let the computer reboot 6. The computer should now boot intoWinFE boot menu. 17
  • 18. Write ProtectTool Management Console  Mount / unmount physical drives attached to the computer as read-only or read-write.  Add custom drivers (e.g. software RAID drivers) 18
  • 19. 19
  • 20.  EncryptionTest  HD / RAM Imaging  Triage 20
  • 22. WINDOWS OS – CryptHunter (LE only) 1. Plug in the WinFE USB thumb drive into the suspect's computer 2. The WinFE USB drive should now be visible in Explorer (My Computer). Browse to the directory titled "CryptHunter" and double-click on the file called "crypthunter". This will begin the encryption test. 3. If anything of note is discovered a pop-up box will appear warning that encryption may be present. 22
  • 23. 23
  • 24. LINUX OSes – quick and dirty  Method 1 –Terminal 1. Open the terminal (console / konsole) and type mount and hit enter (return) 2. This command will list all currently mounted drives on the computer, look for the word "crypt“ 24
  • 25.  Method 2 – System Monitor 25
  • 26. MAC OSX – quick and dirty  Method 1 – Identify FileVault 1. Browse to "Computer"  "Users". If the user account has the following icon then "FileVault" is enabled. FileVault encrypts all of the user's files. 26
  • 27.  Method 2 – Activity Monitor 1. Other 3rd part encryption tools are available for Mac OSX. In order to check if these encryption programs are running. Browse to "Applications“  "Utilities"  "Activity Monitor“ 2. Once the Activity Monitor is displayed use the drop-down menu to select "All Processes“ 3. Look for any process that includes the word "crypt". If any of the processes mention the word "crypt" then it is likely that the computer features encryption. 27
  • 28.  Method 2 – Activity Monitor 28
  • 29. RAM:  DumpIt  Simple executable, puts output in same directory as EXE  Has some issues with RAM larger than 8GB  WinPMEM  CMD based  Supports RAM larger than 8GB  Supports RAW & Crashdump formats  FTK Imager  GUI version only  Supports RAW acquisition as well as Pagefile.sys & Hiberfil.sys  Larger footprint than DumpIt & WinPMEM HD:  FTK Imager 29
  • 30. RAM:  FMEM  Creates kernel mirror driver  Then use dd commands to capture HD:  DD  Built-in  FTK Imager CLI  Debian  Ubuntu (x32 & x64)  Fedora (x32 & x64) 30
  • 31. RAM:  OSXPMEM  Supports up to and including 10.9.x  Creates kernel mirror driver (must be extracted onto local machine to run or from HFS+/exFAT partition)  Supports Raw, Mach-O, and ELF formats 1. copy OSXPMem.tar.gz to local directory 2. tar xvf OSXPMem.tar.gz 3. ./osxpmem -h to give help 4. ./osxpmem memory.dump 31
  • 32. HD:  FTK Imager for Mac  CLI only, no GUI  Needs to be copied to local machine to run (or on HFS+/exFAT partition)  Mac OSX Forensic Imager  Needs to be copied to local machine to run (or on HFS+/exFAT partition) 32
  • 33. 1. Connect an external hard drive (via USB) to the suspect's computer 2. Open "WinFEWrite ProtectTool Management Console " and mount this new drive as read/write  NOTE – if this is the first drive you are mounting in WinFE it will be given the drive letter “C”  This drive will now be visible inWindows Explorer 3. Open FTK Imager and image normally 33
  • 34.  Even w/o X-Ways or EnCase dongles there are a number of tools to facilitate triage of devices  Apple Bootcamp script allows HFS+ partitions to be seen throughWinFE w/o third party tools 34
  • 35.  XnView:  Graphic files  Recursively look at directories  Tag files  create reports 35
  • 37.  Nirsoft SearchMyFiles  Keyword searching  Advanced Filtering: ▪ Date range ▪ File type ▪ File size  Context search (binary or text)  Identify encrypted files  Identify duplicates  Create reports (CSV, HTML) 37
  • 39.  Email viewing programs:  MiTec MailView ▪ DBX, MBX, EML,Thunderbird DB  Kernel Exchange EDBViewer ▪ EDB, STM  Kernel OSTViewer ▪ OST  Kernel Outlook PSTViewer ▪ PST  Windows MBOXViewer ▪ MBOX 39
  • 40.  SQLite  SQLite DB Browser  SQLiteQ  Microsoft ESE/EDB/JET Blue DB files  Nirsoft ESEDatabaseView 40
  • 41.  Web browser history  Nirsoft BrowsingHistoryView ▪ IE (including 10/11), Firefox, Chrome, Safari  Windows Registry  LockAnd Code RegistryBrowser ▪ Mount the suspect's drive as read-only usingWrite Protect Tool first 41
  • 42. 42
  • 43.  Larson,T. (2008) “HowTo BuildWindows FEWithThe Windows Preinstallation Environment 2.1”, SysInternals, Microsoft Law Enforcement Portal  Shavers, B. (2010) “The (Nearly) Perfect Forensic Boot CD”, URL: http://www.forensicfocus.com/downloads/WinFE.pdf 43
  • 44.  CryptHunter (LE only) - http://www.cert.org/digital-intelligence/tools/crypthunter.cfm?  Kernel Data Recovery Tools - http://www.nucleustechnologies.com/  MiTeC (MailView, SQLiteQ) - http://www.mitec.cz  Nirsoft Suite - http://nirsoft.net/  RegistryBrowser - https://lockandcode.com/software/registry_browser  SQLite Database Browser - http://sourceforge.net/projects/sqlitebrowser/  WinBuilder - http://reboot.pro/files/file/4-winbuilder/  Windows Assessment and Deployment Kit (Windows ADK) - http://www.microsoft.com/en-us/download/details.aspx?id=39982&751be11f- ede8-5a0c-058c-2ee190a24fa6=True  Windows Automated Installation Kit (Windows AIK) - http://www.microsoft.com/en-au/download/details.aspx?id=5753  Windows MBOX Viewer - http://sourceforge.net/projects/mbox-viewer/  WinFE Blog (Brett Shavers) - http://winfe.wordpress.com/  XnView - http://www.xnview.com/en/ 44

Editor's Notes

  1. Very basic: No write-protection of devices No Windows Explorer - all tools were 3rd party
  2. No GUI but could run GUI software (for example FTK Imager or XWF)
  3. Windows 8/8.1 WinFE require Windows Assessment and Deployment Kit (Windows ADK) http://www.microsoft.com/en-us/download/details.aspx?id=39982&751be11f-ede8-5a0c-058c-2ee190a24fa6=True
  4. Example of slip-streaming the HASP dongle drivers (for EnCase)
  5. Dependant on host PC resources, there is the ability to boot the suspect’s PC as a forensically sound VM with VirtualBox (requires 64bit WinFE, lots of RAM and MIP to mount physical disk) mount image write-cached function)
  6. If this menu is not displayed then the computer is trying to boot into another OS  pull the power cord!
  7. If you are LE I recommend that you get access to the US CERT program CryptHunter (free): Small footprint, able to detect many encryption programs as well as boot sector abnormalities Supports: BestCrypt, DriveCrypt, Sophos SafeGaurd, Paragon Encrypted Disk, PGPDisk, TrueCrypt, BitLocker
  8. If non-LE (or CryptHunter is not available) it is useful to check Task Manager for running processes
  9. Can also look at running processes to determine if any encryption programs are running
  10. Latest version of FileVault allows for full disk encryption and therefore the symbol may not be present on the user directory
  11. Windows imaging HDs live, there is FTK Imager (including CLI), Cygwin DD, also EnCase acquisition / imager, XWF if dongle present
  12. As well as Nirsoft Opera History View, cache view, etc
  13. Additional tools: Cygwin (dd, NetCat) Nirsoft live password recovery tools Wireshark