os and application files bacs 371 computer forensics

34
OS and Application Files BACS 371 Computer Forensics

Upload: maud-spencer

Post on 24-Dec-2015

228 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: OS and Application Files BACS 371 Computer Forensics

OS and Application Files

BACS 371Computer Forensics

Page 2: OS and Application Files BACS 371 Computer Forensics

Software

Operating Systems Recycle Bin Temp Directory Backup Files Printer Spool Files Windows Registry Swapping/Paging

Applications Temporary Internet Files Temp Files Application Specific Files

Page 3: OS and Application Files BACS 371 Computer Forensics

Recycle Bin (pre-Vista) When you delete a file in Windows Explorer or My Computer, the file

appears in the Recycle Bin. The file remains in the Recycle Bin until you empty the Recycle Bin or restore the file.

Older files are also removed from the Recycle Bin when newer files are deleted and the Recycle Bin exceeds the maximum size allocated in Recycle Bin properties.

Each hard disk contains a hidden folder named Recycled. This folder contains files deleted in Windows Explorer or My Computer, or in Windows- based programs.

When you delete a file, the complete path and file name is stored in a hidden file on the computer. This file has different names and locations depending on the OS. It is called Info or Info2 in the Recycled folder. The deleted file is renamed, using the following syntax: D<original drive letter of file><#>.<original extension>

Examples: New File Name: Dc1.txt = (C drive, second file deleted, a .txt file) INFO file path: C:\Windows\Desktop\Books.txt New File Name: De7.doc = (E drive, eighth file deleted, a .doc file) INFO file path: E:\Winword\Letter to Rosemary.doc

Page 4: OS and Application Files BACS 371 Computer Forensics

Recycle Bin (Vista & Windows 7)1

In Windows 7 and Vista, Microsoft did away with the INFO2 file and completely changed the way files were named and indexed within the Recycle Bin. 

The new Recycle Bin is located in a hidden directory named \$Recycle.Bin\%SID%, where %SID% is the SID of the user that performed the deletion. 

When files are moved into the Recycle Bin, the original file is renamed to $R followed by a set of random characters, but maintaining the original file extension.  At the same time a new file beginning with $I followed by the same set of random characters given to the $R file and the same extension, is created; this file contains the original filename/path, original file size, and the date and time that the file was moved to the Recycle Bin. 

All of the $I files are exactly 544 bytes long.

Page 5: OS and Application Files BACS 371 Computer Forensics

Hidden Recycler Directory (pre-Vista)

Page 6: OS and Application Files BACS 371 Computer Forensics

INFO2 File

Page 7: OS and Application Files BACS 371 Computer Forensics

Hidden Recycler Directory (post-Vista)

Page 8: OS and Application Files BACS 371 Computer Forensics

Temp Directory

Page 9: OS and Application Files BACS 371 Computer Forensics

Backup

Search for BACKUP.LOG

Page 10: OS and Application Files BACS 371 Computer Forensics

Spool Files

Simultaneous Peripheral Operations On-Line

Temporary files used during input/output operations

Typically used to allow printers to run in the “background”

Typically deleted after print job is complete

May be Printer specific – check settings for Server Properties

Page 11: OS and Application Files BACS 371 Computer Forensics

WinXP Spool File Default

Page 12: OS and Application Files BACS 371 Computer Forensics

While Printing

After Printing

Page 13: OS and Application Files BACS 371 Computer Forensics

Windows Registry

A database which stores Hardware and software configuration information User preferences (incl user name and passwords) Setup information

Viewed with Regedit (www.microsoft.com/windows/reskits/default.asp)

Can be used to view Last person to log on Most recently accessed files Most recently accessed devices Application specific information

Internet sites accessed Recent files Chat rooms accessed …

Page 14: OS and Application Files BACS 371 Computer Forensics

WinXP Registry Hives

HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_LOCAL_MACHINE HKEY_USERS HKEY_CURRENT_CONFIGCreated from files located at \WINDOWS\System32\Config SAM SECURITY SOFTWARE SYSTEM

Page 15: OS and Application Files BACS 371 Computer Forensics

Registry Files

“In Use” “Backup”Win95

“Backup”Win98/Me

WinXP In C:\WINDOWS\

SYSTEM32\CONFIG\

System.DATUser.DAT

Sytem.DA0User.DA0

RB001.CABRB002.CABRB003.CABRB004.CABRB005.CAB

SystemSoftware SamSecurityDefault

REGEDIT /L: (system.dat) /R: (user.dat) /E outfile.txt

Page 16: OS and Application Files BACS 371 Computer Forensics

Windows XP RegistryFilename Location Contents

ntuser.dat \Documents and Settings\<user account>(One for each user on system)

Protected Storage Most Recently Used User Preferences

Default \Windows\system32\config System Settings

SAM \Windows\system32\config User account management and security settings

Security \Windows\system32\config Security Settings

Software \Windows\system32\config All installed programs, their settings, and any usernames and passwords associated with them

System \Windows\system32\config System Settings

Page 17: OS and Application Files BACS 371 Computer Forensics

WinXP Registry

\Windows\System32\Config Run…Regedit

Page 18: OS and Application Files BACS 371 Computer Forensics

Windows 7 Registry

Page 19: OS and Application Files BACS 371 Computer Forensics

Registry Entries

Page 20: OS and Application Files BACS 371 Computer Forensics

Most Recently Used (MRU) Listings

HKEY_CURRENT_USER\Software\Microsoft\Office\10.0\Common\Open Find

Page 21: OS and Application Files BACS 371 Computer Forensics

Registry – Uninstall Key

May show software installed currentlyOr in the past on system

Page 22: OS and Application Files BACS 371 Computer Forensics

Registry – Date Last UsedRegistry Key for file execution - HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist

Page 23: OS and Application Files BACS 371 Computer Forensics

ROT13

http://en.wikipedia.org/wiki/ROT13 http://www.rot13.com/index.php

Page 24: OS and Application Files BACS 371 Computer Forensics

ROT13 Translation

Page 25: OS and Application Files BACS 371 Computer Forensics

Temporary Internet Files

Internet Explorer History File (index.dat) http://www.mandiant.com/webhistorian.htm

Page 26: OS and Application Files BACS 371 Computer Forensics

INDEX.DAT Files

Page 27: OS and Application Files BACS 371 Computer Forensics

INDEX.DAT

Page 28: OS and Application Files BACS 371 Computer Forensics

URL - (Local File)-The URL from which the file came, including the original file name on that website.

User Name-The Windows User name logged on at the time the file was saved.

Last Accessed-The date and time the URL was last accessed by the client.

Last Modified-The date and time of content last modified on server.

Last Checked-Last synch time.

Expires-A field that con be optionally specified by the website designer for certain files which are "session" files - ones that expire at the end of the browsing session at that site. (Most files will be "persistent") The website indicates when the browser should discard the cache entry and go back to the web site.

Hits-Reflects how many accesses have been made to that URL. It can get go up from redirects or cookie redirects to add sites.

Use Count-Reflects how many users have used the cache entry in a shared cache on Windows 98 systems with multiple user profiles set up.On Windows 2000/XP, it is almost always 0, because each user gets his own set of index.dat files.

Page 29: OS and Application Files BACS 371 Computer Forensics

INDEX.DAT Decoded

Page 30: OS and Application Files BACS 371 Computer Forensics

Temporary Internet Files Directory Internet Explorer saves copies of many

things that are displayed on the screen when you surf the web.

These include: downloads images (including embedded images on

web-pages) cached pages cookies etc…..

This is a good source of evidence.

Page 31: OS and Application Files BACS 371 Computer Forensics

Page/Swap File

Persistent TemporaryDetermine by:

HKEY_LOCAL_MACHINE\CurrentControlSet\Control\Session Manager\Memory Management\ClearPageFileAtShutdown0 = do not overwrite1 = overwrite

Page 32: OS and Application Files BACS 371 Computer Forensics

Overwrite Page File at Shutdown?

Page 33: OS and Application Files BACS 371 Computer Forensics

Application Temporary Files Search *.tmp

Page 34: OS and Application Files BACS 371 Computer Forensics

Application Specific Files

Specific database, backup, or temporary files used by applications