registry artifacts
play

Registry Artifacts Villanova University Department of Computing - PowerPoint PPT Presentation

Registry Artifacts Villanova University Department of Computing Sciences D. Justin Price Spring 2014 REGISTRY The registry is a central hierarchal database intended to store information that is necessary to configure the


  1. Registry Artifacts Villanova University – Department of Computing Sciences – D. Justin Price – Spring 2014

  2. REGISTRY • The registry is a “central hierarchal database” intended to store information that is necessary to configure the system for one or more users, applications, and hardware devices.[1] • Goldmine for digital forensics. • Registry Breakdown • Hives (binary database files) • Keys & Subkeys (analogous to a folders) • Values (analogous to a file) • Type (strings, binary or DWORD) • Data Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014 [1] http://support.microsoft.com/kb/256986

  3. REGISTRY HIVES • SAM – Local user accounts & groups • Security – Security information used by the operating system to include password policies, group memberships, etc. • System – Hardware and service configurations • Software – Application settings • NTUSER.dat – User settings, configuration and environment settings • UsrClass.dat – More widely used in Vista/7/8 – Shellbag Information Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  4. REGISTRY HIVES • System Registry Hives � XP/Vista/7/8 C:\Windows\System32\config\SAM � XP/Vista/7/8 C:\Windows\System32\config\SECURITY � XP/Vista/7/8 C:\Windows\System32\config\SYSTEM � XP/Vista/7/8 C:\Windows\System32\config\SOFTWARE � • User Specific Registry Hives � XP C:\Documents and Settings\<USERNAME>\NTUSER.dat � Vista/7/8 C:\Users\<USERNAME>\NTUSER.dat � Vista/7/8 C:\Users\<USERNAME>\AppData\Local\Microsoft\Windows\UsrClass.dat � • Backup System Registry Hives Vista/7/8 C:\Windows\System32\config\RegBack Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  5. REGISTRY VALUE TYPES REG_NONE No Value REG_SZ Unicode or ASCII String REG_BINARY Binary Data REG_DWORD 32-bit Number REG_LINK Unicode Symbolic Link REG_QWORD 64-bit Number Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  6. VIEWING REGISTRY HIVES • Live System Analysis - regedit.exe Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  7. VIEWING REGISTRY HIVES • Offline Analysis - AccessData Registry Viewer • http://marketing.accessdata.com/acton/attachment/4390/u-011c/0/-/-/-/-/ Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  8. VIEWING REGISTRY HIVES • Offline Analysis - MiTeC Windows Registry Recovery (WRR) • http://www.mitec.cz/wrr.html Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  9. EXTRACTING REGISTRY HIVES Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  10. EXTRACTING REGISTRY HIVES Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  11. LAST WRITE TIME • Last Write Time is recorded for each key in every hive. • Time is stored in UTC. • Time stamp reflects when a value has been added or updated. Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  12. SECURITY ACCOUNTS MANAGER (SAM) • Security Identifier (SID) • Recycle Bin entries, file ownership and other artifacts refer to a SID and not a username. • Microsoft Documented SID Accounts • Administrator = 500 • Guest = 501 • User Account = start at 1000 • Password fields can be misleading • Password Required = password policies applied to user accounts do not apply to this account • We will work with a much better tool to determine if a password was set for this account in the Encryption/ Password lecture! Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  13. SAM Hive Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  14. SAM Hive Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  15. SAM Hive Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  16. PROFILE LIST • Details all profiles that have used the system to include local and domain users. • SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  17. PROFILE LIST • Details all profiles that have used the system to include local and domain users. • SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  18. SYSTEM HIVE • Current Control Set • SYSTEM\Select\Current • Answers the following questions: • Which configuration files should be loaded? • If an error is detected, which configuration files should be tried next? • Which configuration files reported errors? Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  19. SYSTEM HIVE • Computer Name: – SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName � � • Time Zone: – SYSTEM\CurrentControlSet\Control\TimeZoneInformation � � � � • Last Access Timestamp: – SYSTEM\CurrentControlSet\Control\FileSystem Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  20. SYSTEM HIVE • Network Interfaces: – SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  21. SYSTEM HIVE • User Shares Enable: – SYSTEM\CurrentControlSet\Services\lanmanserver\Shares � � � • System Shutdown Timestamps and Counters (XP): – SYSTEM\CurrentControlSet\Control\Windows – SYSTEM\CurrentControlSet\Control\Watchdog\Display Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  22. SOFTWARE HIVE • Operating System Version: – SOFTWARE\Microsoft\Windows NT\CurrentVersion Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  23. SOFTWARE HIVE • Historical Networks (Vista/7/8): – Managed by a Domain – SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures \Managed – DnsSuffix = Domain – FirstNetwork = SSID – DefaultGatewayMac = Media Access Control (MAC) Address of Gateway – Last Written Time = Last time the computer connected to this network. Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  24. SOFTWARE HIVE • Historical Networks (Vista/7/8): – Not Managed by a Domain – SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList \Signatures\Unmanaged Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  25. SOFTWARE HIVE • Network Type: – SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces\{GUID} (XP) – SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList \Profiles (Vista/7/8) » NameType 0x47 = Wireless » NameType 0x06 = Wired » NameType 0x17 = Broadband » Date fields are recorded as 128-bit System date …. use Dcode to convert. Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  26. AUTO-START PROGRAMS • Various Registry Locations: – NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Run – NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\RunOnce – SOFTWARE\Microsoft\Windows\CurrentVersion\Run – SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce – SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run – SYSTEM\CurrentControlSet\Services • (0x02 = start) Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  27. NTUSER.DAT HIVE • Windows XP Search History – NTUSER.DAT\Software\Microsoft\Search Assistant\ACMru • Windows 7 Search History – NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer \WordWheelQuery � � � � � � � • Windows 8 Search History – NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer \SearchHistory Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  28. NTUSER.DAT HIVE • Internet Explorer Typed URLs – NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer \TypedPaths Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

  29. NTUSER.DAT HIVE • Recently Accessed Files – NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer \RecentDocs – MRUList shows the order in which the files were accessed. – The most recent file opened will be first. Villanova University – Department of Computing Sciences – D. Justin Price – Digital Forensics - Spring 2014

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend