Operating System Forensics Flashcards
Windows O/S Forensics Methodology
- Collecting Volatile Information
- Collecting Non-Volatile Information
- Windows Memory Analysis
- Windows Registry Analysis
- Cache, Cookie & History Analysis
- Windows File Analysis
- Metadata Investigation
- Event Logs Analysis
What is the first volatile information you need to collect?
System time/date
The second piece of volatile information you collect is logged on users. What are the three tools you can use for this?
- PSloggedon
- LogonSessions -p
- net session
What are the three ways you can check for open files?
- net file
- psfile
- openfiles
What two commands can show you network information?
- nbtstat -c
2. netstat -a | -r
What can show you the memory contents of processes?
a. tasklist /v
b. pslist -x
c. listdlls
d. handle
Process to port mapping
- netstat -o
2. netstat -fport
Process Memory Tools
- process explorer
- pmdump
- userdump
Network Status Tools
- ipconfig
- promqry
- promisdetect
Print Spool Files
The temporary files can store print details such as owner, document, printer, printing processor - format, number of copies printed and the print method
Print Spool Files Support what two data types?
RAW - .SPL file consists of data to be printed EMF - .SPL file consists the metadata and can be printed on any printer
FSUTIL Object ID
Manages object identifiers, which are used by the Windows operating system to track objects such as files and directories. fsutil quota. Manages disk quotas on NTFS volumes to provide more precise control of network-based storage
FSUTIL Disable LAST ACCESS UPDATE on files:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\FileSystem\Disablas tacess
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\FileSystem\
NTFSDisablelastacessupdate
Autoruns
a great tool for checking areas within the file system, such as scheduled tasks.
Microsoft Security IDs for users
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
Event Logs-PSLogList
PsLogList allows to login to remote systems in situations when current set of security credentials would not permit access to the Event Log.
ESE Database
Windows 10 comes with Microsoft Edge as the default web browser. It uses the Extensible Storage Engine (ESE) database format to store browsing records, including history, cache, and cookies.
ESE Database Tables
categorized as FileCleanup, Folder, ReadingList, RowId, MSysObjids, MSysObjects, FolderStash, MSysLocales, and MSysObjectsShadow. These tables contain information of all the applications stored and accessed from the system. This information can act as evidence in case of criminal incidents.
ESE Database Path
\Users\user_name\AppData\Local\Packages\Microsoft.MicrosoftEdge_xxxxx\AC\Micr osoftEdge\User\Default\DataStore\Data\nouser1\xxxxx\DBStore\spartan.eb
Microsoft Edge cached Files
Edge cached files location:
\Users\user_name\AppData\Local\Packages\Microsoft.MicrosoftEdge_xxxx
\AC#!001\MicrosoftEdge\Cache\
Edge last active browsing session data location:
\Users\user_name\AppData\Local\Packages\Microsoft.MicrosoftEdge_xxxx
\AC\MicrosoftEdge\User\Default\Recovery\Active\
Edge stores history records, Cookies, HTTP POST request header packets and downloads in:
\Users\user_name\AppData\Local\Microsoft\Windows\WebCache\WebCac heV01.dat
If the last browsing session was opened in InPrivate mode then the browser stores these records in:
\Users\user_name\AppData\Local\Packages\Microsoft.MicrosoftEdge_xxxx
\AC\MicrosoftEdge\User\Default\Recovery\Active{browsing-session- ID}.dat
DevCon Tool
Device Console , is a command-line tool that displays detailed information about devices on computers running Windows operating system. DevCon can be used to enable, disable, install, configure, and remove devices. It also performs device management functions on local computers and remote computers.