Villanova University – Department of Computing Sciences – D. Justin Price – Spring 2014
Registry Artifacts Villanova University Department of Computing - - PowerPoint PPT Presentation
Registry Artifacts Villanova University Department of Computing - - PowerPoint PPT Presentation
Registry Artifacts Villanova University Department of Computing Sciences D. Justin Price Spring 2014 REGISTRY The registry is a central hierarchal database intended to store information that is necessary to configure the
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
REGISTRY
- The registry is a “central hierarchal database” intended to store
information that is necessary to configure the system for one or more users, applications, and hardware devices.[1]
- Goldmine for digital forensics.
- Registry Breakdown
- Hives (binary database files)
- Keys & Subkeys (analogous to a folders)
- Values (analogous to a file)
- Type (strings, binary or DWORD)
- Data
[1] http://support.microsoft.com/kb/256986
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
REGISTRY HIVES
- SAM
– Local user accounts & groups
- Security
– Security information used by the operating system to include password policies, group memberships, etc.
- System
– Hardware and service configurations
- Software
– Application settings
- NTUSER.dat
– User settings, configuration and environment settings
- UsrClass.dat
– More widely used in Vista/7/8
– Shellbag Information
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
REGISTRY HIVES
- System Registry Hives
- User Specific Registry Hives
- Backup System Registry Hives
XP/Vista/7/8 C:\Windows\System32\config\SAM XP/Vista/7/8 C:\Windows\System32\config\SECURITY XP/Vista/7/8 C:\Windows\System32\config\SYSTEM XP/Vista/7/8 C:\Windows\System32\config\SOFTWARE XP C:\Documents and Settings\<USERNAME>\NTUSER.dat Vista/7/8 C:\Users\<USERNAME>\NTUSER.dat Vista/7/8 C:\Users\<USERNAME>\AppData\Local\Microsoft\Windows\UsrClass.dat Vista/7/8 C:\Windows\System32\config\RegBack
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
REGISTRY VALUE TYPES
REG_NONE No Value REG_SZ Unicode or ASCII String REG_BINARY Binary Data REG_DWORD 32-bit Number REG_LINK Unicode Symbolic Link REG_QWORD 64-bit Number
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
VIEWING REGISTRY HIVES
- Live System Analysis - regedit.exe
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
VIEWING REGISTRY HIVES
- Offline Analysis - AccessData Registry Viewer
- http://marketing.accessdata.com/acton/attachment/4390/u-011c/0/-/-/-/-/
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
VIEWING REGISTRY HIVES
- Offline Analysis - MiTeC Windows Registry Recovery (WRR)
- http://www.mitec.cz/wrr.html
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
EXTRACTING REGISTRY HIVES
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
EXTRACTING REGISTRY HIVES
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
LAST WRITE TIME
- Last Write Time is recorded for each key in every hive.
- Time is stored in UTC.
- Time stamp reflects when a value has been added or updated.
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SECURITY ACCOUNTS MANAGER (SAM)
- Security Identifier (SID)
- Recycle Bin entries, file ownership and other artifacts refer to
a SID and not a username.
- Microsoft Documented SID Accounts
- Administrator = 500
- Guest = 501
- User Account = start at 1000
- Password fields can be misleading
- Password Required = password policies applied to user
accounts do not apply to this account
- We will work with a much better tool to determine if a
password was set for this account in the Encryption/ Password lecture!
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SAM Hive
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SAM Hive
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SAM Hive
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
PROFILE LIST
- Details all profiles that have used the system to include local and
domain users.
- SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
PROFILE LIST
- Details all profiles that have used the system to include local and
domain users.
- SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Current Control Set
- SYSTEM\Select\Current
- Answers the following questions:
- Which configuration files should be loaded?
- If an error is detected, which configuration files should be tried next?
- Which configuration files reported errors?
SYSTEM HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Computer Name:
– SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
- Time Zone:
– SYSTEM\CurrentControlSet\Control\TimeZoneInformation
- Last Access Timestamp:
– SYSTEM\CurrentControlSet\Control\FileSystem
SYSTEM HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Network Interfaces:
– SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces
SYSTEM HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- User Shares Enable:
– SYSTEM\CurrentControlSet\Services\lanmanserver\Shares
- System Shutdown Timestamps and Counters (XP):
– SYSTEM\CurrentControlSet\Control\Windows – SYSTEM\CurrentControlSet\Control\Watchdog\Display
SYSTEM HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Operating System Version:
– SOFTWARE\Microsoft\Windows NT\CurrentVersion
SOFTWARE HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Historical Networks (Vista/7/8):
– Managed by a Domain – SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures \Managed – DnsSuffix = Domain – FirstNetwork = SSID – DefaultGatewayMac = Media Access Control (MAC) Address of Gateway – Last Written Time = Last time the computer connected to this network.
SOFTWARE HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Historical Networks (Vista/7/8):
– Not Managed by a Domain – SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList \Signatures\Unmanaged
SOFTWARE HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Network Type:
– SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces\{GUID} (XP) – SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList \Profiles (Vista/7/8) » NameType 0x47 = Wireless » NameType 0x06 = Wired » NameType 0x17 = Broadband » Date fields are recorded as 128-bit System date …. use Dcode to convert.
SOFTWARE HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Various Registry Locations:
– NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Run – NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\RunOnce – SOFTWARE\Microsoft\Windows\CurrentVersion\Run – SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce – SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run – SYSTEM\CurrentControlSet\Services
- (0x02 = start)
AUTO-START PROGRAMS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Windows XP Search History
– NTUSER.DAT\Software\Microsoft\Search Assistant\ACMru
- Windows 7 Search History
– NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer \WordWheelQuery
- Windows 8 Search History
– NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer \SearchHistory
NTUSER.DAT HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Internet Explorer Typed URLs
– NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer \TypedPaths
NTUSER.DAT HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Recently Accessed Files
– NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer \RecentDocs – MRUList shows the order in which the files were accessed. – The most recent file opened will be first.
NTUSER.DAT HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Microsoft Office Recent Documents
- NTUSER.DAT\Software\Microsoft\Office\14.0\Word\FileMRU
- NTUSER.DAT\Software\Microsoft\Office\14.0\Excel\FileMRU
- NTUSER.DAT\Software\Microsoft\Office\14.0\Powerpoint\FileMRU
- Office XP - Version 10.0
- Office 2003 - Version 11.0
- Office 2007 - Version 12.0
- Office 2010 - Version 14.0
NTUSER.DAT HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Common Dialogs API (ComDlg32)
- Open and Save As APIs
- NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer
\ComDlg32\OpenSaveMRU (XP)
- NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer
\ComDlg32\OpenSavePidMRU (Vista/7/8)
NTUSER.DAT HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Common Dialogs API (ComDlg32)
- Last Visited - records specific executable used to open the files along with the
directory that was last accessed.
- NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer
\ComDlg32\LastVisitedMRU (XP)
- NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer
\ComDlg32\LastVisitedPidMRU (Vista/7/8)
NTUSER.DAT HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Commands Executed from the Run Box
- NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer
\RunMRU
- MRU List provides the order in which the commands were executed.
NTUSER.DAT HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- UserAssit
- Records what application(s) a user has run, when and how many
times:
– NTUSER\Software\Microsoft\Windows\CurrentVersion\Explorer \UserAssist\{GUID}\Count
- Valuable resource to determine user activity and technical knowledge.
- Values are encoded using a simple substation cipher (ROT13).
- Run count starts a 6(?) …. some viewers will automatically adjust this
value so it is important to know what your tool is doing
- {CEBFF5CD-ACE2-4F4F-9178-9926F41749EA} = Executable File
- {F4E57C4B-2036-45F0-A9AB-443BCFE33D9F} = Shortcut File
Execution
NTUSER.DAT HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- UserAssit
- Win XP/Vista
- All values begin with
- UEME_RUNPATH
- Launched from the Absolute Path
- UEME_RUNCPL
- Launched from the Control Panel Applet
- UEME_RUNPIDL
- Launched from a Shortcut
- UEME_UIQCUT
- Launched from the Quick Launch Menu
- UEME_UISCUT
- Launched from a Desktop Shortcut
- UEME_UITTOOLBAR
- Launched from the Windows Explorer Toolbar
NTUSER.DAT HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- UserAssit
- Win 7/8
- http://www.aldeid.com/wiki/Windows-userassist-keys#Translation_of_directories
NTUSER.DAT HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- MUICache
- Multi-language User Interface
- One more location to see if a program was executed even if the
program was uninstalled.
- Timestamps are not recorded as each program is a value.
- Win XP
- NTUSER.DAT\Software\Microsoft\Windows
\ShellNoRoam\MUICache
- Win 7/8
- USRCLASS.DAT\Local Settings\Software\Microsoft
\Windows\Shell\MuiCache
- Consider processing Volume Shadow Copies (VSC)
NTUSER.DAT HIVE
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- https://code.google.com/p/regripper/wiki/RegRipper
RegRipper
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
RegRipper
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
RegRipper Plugins
- List All Plugins
- rip -l
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
RegRipper Plugins
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- USB devices are commonly used to transferring data.
- Determine how the user is using the system
- Identify other devices that may be important to the investigation
- Determine the first time a USB drive was connected to the
system.
- Determine the last time a USB drive was connected to the
system.
- Artifact Locations:
USB FORENSICS
XP/Vista/7/8 C:\Windows\System32\config\SYSTEM XP/Vista/7/8 C:\Windows\System32\config\SOFTWARE XP C:\Documents and Settings\<USERNAME>\NTUSER.dat Vista/7/8 C:\Users\<USERNAME>\NTUSER.dat XP C:\Windows\setupapi.log Vista/7/8 C:\Windows\inf\setupapi.dev.log
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Device’s serial number
- SYSTEM\CurrentControlSet\Enum\USBSTOR
– Vendors “should” manufacture USB devices with unique serial numbers. – Not all devices comply with the standard – Devices that do not have a unique serial number will have an “&” as the 2nd character. – “Last Written Date” is the first time the device was connected to the system since the last reboot.
USB FORENSICS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Device’s Volume Name (Windows 7/8)
- SOFTWARE\Microsoft\Windows Portable Devices\Device
USB FORENSICS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Device’s Mapped Drive Letter (Windows XP/7/8)
- SYSTEM\MountedDevices
- Windows XP uses the device’s ParentIdPrefix
USB FORENSICS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Determine which user used the USB device (Windows 7/8)
- SYSTEM\USBSTOR\<DEVICE>\<Serial#>\Device
Parameters\Partmgr
USB FORENSICS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Determine which user used the USB device 2 (Windows 7/8)
- SYSTEM\MountedDevices
USB FORENSICS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Determine which user used the USB device (Windows 7/8)
- NTUSER.DAT\Software\Microsoft\Windows
\CurrentVersion\Explorer\Mountpoints2
USB FORENSICS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- When was the USB device first used? (Windows 7/8)
- C:\Windows\inf\setupapi.dev.log
USB FORENSICS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- When was the USB device last used? (Windows 7/8)
- NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion
\Explorer\MountPoints\{GUID}
- Key’s Last Write Timestamp
USB FORENSICS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
USB FORENSICS - AUTOMATED
- USBDeviceForensics
- http://www.woanware.co.uk/forensics/usbdeviceforensics.html
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
USB FORENSICS - AUTOMATED
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
- Store user specific preferences for Windows Explorer.
- Shows browsing habits and knowledge of content by a user.
- Uncover evidence of a deleted folder structure.
- Registry Location:
- The following changes will cause a ShellBag key to be updates:
- Window Size
- View Options
- Viewing File in Thumbnail Format
- Sorting Options
SHELL BAGS
XP/Vista/7/8 USRCLASS.DAT\Local Settings\Software\Microsoft\Windows\Shell\Bags XP/Vista/7/8 USRCLASS.DAT\Local Settings\Software\Microsoft\Windows\Shell\BagsMRU XP/Vista/7/8 NTUSER.DAT\Software\Microsoft\Windows\Shell\BagMRU XP/Vista/7/8 NTUSER.DAT\Software\Microsoft\Windows\Shell\Bag
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SHELL BAGS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SHELL BAGS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SHELL BAGS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SHELL BAGS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SHELL BAGS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SHELL BAGS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SHELL BAGS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SHELL BAGS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
SHELL BAGS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
EXTRACTING SHELLBAGS
- sbag.exe
- Download - https://www.tzworks.net/download_links.php
- Info - https://www.tzworks.net/prototype_page.php?
proto_id=14
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014
EXTRACTING SHELLBAGS
Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014