Windows 7: Current Events in the World of Windows Forensics



Similar documents
1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer

EnCase 7 - Basic + Intermediate Topics

BackupAssist v6 quickstart guide

UltraBac Documentation. UBDR Gold. Administrator Guide UBDR Gold v8.0

BackupAssist v6 quickstart guide

Introduction to BitLocker FVE

User Guide. CTERA Agent. August 2011 Version 3.0

How to Troubleshoot the Remote Backup Client log Error Message:

Lab: Data Backup and Recovery in Windows XP

Hyper-V Protection. User guide

System Image Backup and Recovery

NovaBACKUP. User Manual. NovaStor / November 2011

BACKUP & RESTORE (FILE SYSTEM)

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

Determining VHD s in Windows 7 Dustin Hurlbut

Chapter 5: Operating Systems Part 1

Hiva-network.com. Microsoft_70-680_v _Kat. Exam A

UNDELETE 7.0 USER GUIDE

Forensically Determining the Presence and Use of Virtual Machines in Windows 7

Managing Applications, Services, Folders, and Libraries

Lab - Data Backup and Recovery in Windows XP

Basic ShadowProtect Troubleshooting

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

DIGIPASS CertiID. Getting Started 3.1.0

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

VSS installation and application

HW 07: Ch 12 Investigating Windows

Designing and Deploying Connected Device Solutions for Small and Medium Business

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led

Windows XP/Vista/7 Directory Structures

DOCUMENTATION SHADOWPROTECT - MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS

Course Outline. ttttttt

CTERA Agent for Windows

Acronis True Image 2015 REVIEWERS GUIDE

Samsung Data Migration v.3.0 Introduction and Installation Guide

Can Computer Investigations Survive Windows XP?

Retrospect 7.7 User s Guide Addendum

Course 50322B: Configuring and Administering Windows 7

IT Essentials v4.1 LI Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI Windows OS directory structures

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

Configuring and Administering Windows 7

Lenovo Online Data Backup User Guide Version

UNDELETE Users Guide

Crystal Practice Management Encrypting the Database

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Exchange Server Backup and Restore

Practice Test CompTIA A Domain 1 - Operating Systems

Hyperoo 2 User Guide. Hyperoo 2 User Guide

NovaBACKUP. User Manual. NovaStor / May 2014

UNDELETE Users Guide

FAQ for USB Flash Drive

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

HP ProtectTools Embedded Security Guide

ICT Professional Optional Programmes

Clickfree Software Frequently Asked Questions (FAQ)

Boot Camp Installation & Setup Guide

Help System. Table of Contents

Hyper-V Protection. User guide

Optional Lab: Data Backup and Recovery in Windows 7

Operating Systems Forensics

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

Who DIT It? Detecting and Mitigating Privilege Escalation Attacks on the Active Directory Data Store

Kaseya 2. User Guide. Version 7.0. English

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide

CTERA Agent for Windows

TORNADO ONLINE BACKUP ADMINISTRATOR S GUIDE

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

How to protect, restore and recover SQL 2005 and SQL 2008 Databases

Gladinet Cloud Backup V3.0 User Guide

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

USB Flash Memory TransMemory-EX II TM

Data Containers. User Guide

MozyPro User Guide Version

Hyper-V Cloud Practice Builder. Disaster Recovery Using DPM 2010

Administration Guide - Virtual Server idataagent (Microsoft Hyper-V)

Quick Start - Generic NAS File Archiver

Lab - Data Backup and Recovery in Windows 7

Get Success in Passing Your Certification Exam at first attempt!

TPM. (Trusted Platform Module) Installation Guide V for Windows Vista

Acronis Backup & Recovery 11.5

(Exam ): Configuring

Networking Best Practices Guide. Version 6.5

ilaw Installation Procedure

Q&A. DEMO Version

Technical Note P/N REV A02 May 07, 2010

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

Computer Forensics Principles and Practices

Ahsay A-Click Backup. User s Guide. Ahsay Systems Co. Ltd. 2 August 2011

AccuGuard Desktop and AccuGuard Server User Guide

Understanding Backup and Recovery Methods

DriveLock and Windows 7

Windows BitLocker Drive Encryption Step-by-Step Guide

ADMINISTERING WINDOWS VISTA SECURITY: THE BIG SURPRISES

Introduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com)

Quick Start Guide. Version R9. English

Transcription:

Windows 7: Current Events in the World of Windows Forensics Troy Larson Senior Forensic Program Manager Network Security, Microsoft Corp.

Where Are We Now? Vista & Windows 2008 BitLocker. Format-Wipes the volume. EXFAT. Event Logging format, system, scheme. Virtual Folders & Registry. Volume Shadow Copy. Links, Hard and Symbolic. Change Journal. Recycle Bin. Superfetch.

Where Are We Now? Windows 7 & Window 2008 R2 Updated BitLocker. BitLocker To Go. VHDs Boot from, mount as Disks. XP Mode. Flash Media Enhancements. Libraries, Sticky Notes, Jump Lists. Service and Driver triggers. I.E. 8, InPrivate Browsing, Tab and Session Recovery. Even more Volume Shadow Copy.

Digital Forensics Subject Matter Expertise Stack Applications e.g., I.E., etc. OS Artifacts File Systems NTFS, FAT32, EXFAT Fvevol.sys Thanks to Eoghan Casey. Mount, Partition & Volume Managers Disk

Windows 7 Disk Note disk signature: 2E140032 0x1b8-1bb

Windows 7 Disk HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 \DiskController\0\DiskPeripheral\0 Diskpart >Automount scrub

Vista Disk HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\STORAGE\Volume\ 1&19f7e59c&0&Signature2E140032Offset100000Length114FD00000

Partitions and Volumes Applications e.g., I.E., etc. OS Artifacts File Systems NTFS, FAT32, EXFAT Fvevol.sys Mount, Partition & Volume Managers Virtual Hard Drives Create Attach Detach Delete Disk

BitLocker: Windows 7 During installing, Windows 7 creates a System Reserved volume enabling set up of BitLocker. In Vista, the System volume was generally 1.5 GB or more.

BitLocker: Vista Physical level view of the header of the boot sector of a Vista BitLocker protected volume: 0xEB 52 90 2D 46 56 45 2D 46 53 2D ër-fve-fs-

BitLocker: Windows 7 Physical level view of the header of the boot sector of a Windows 7 BitLocker protected volume: 0xEB 58 90 2D 46 56 45 2D 46 53 2D ëx-fve-fs-

BitLocker: Windows 7 Vista & Windows 2008 cannot unlock BitLocker volumes created with Windows 7 or 2008 R2. Forensics tools may not recognize the new BitLocker volume header. Must use Windows 7 or 2008 R2 to open (and image) BitLocker volumes from Windows 7 or 2008 R2.

BitLocker Review or Imaging User Mode Kernel Mode Application File System Driver Fvevol.sys Volume Manager FVEVOL.SYS sits underneath the file system driver and performs all encryption / decryption. Once booted, Windows (and the user) sees no difference in experience. The encryption / decryption happens at below the file system.

BitLocker Review or Imaging User Mode Kernel Mode Application File System Driver Fvevol.sys Volume Manager

BitLocker Review or Imaging The More/Less information button will provide the BitLocker volume recovery key identification.

BitLocker Review or Imaging BitLocker Recovery Key 783F5FF9-18D4-4C64-AD4A- CD3075CB8335.txt: BitLocker Drive Encryption Recovery Key The recovery key is used to recover the data on a BitLocker protected drive. To verify that this is the correct recovery key compare the identification with what is presented on the recovery screen. Recovery key identification: 783F5FF9-18D4-4C Full recovery key identification: 783F5FF9-18D4-4C64-AD4A- CD3075CB8335 BitLocker Recovery Key: 528748-036938-506726-199056-621005-314512-037290-524293

BitLocker Review or Imaging Enter the recovery key exactly.

BitLocker Review or Imaging Viewed or imaged as part of a physical disk, BitLocker volumes appear encrypted.

BitLocker Review or Imaging To view a BitLocker volume as it appears in its unlocked state, address it as a logical volume.

BitLocker Review or Imaging

File Systems Applications e.g., I.E., etc. OS Artifacts File Systems NTFS, FAT32, EXFAT Fvevol.sys Mount, Partition & Volume Managers Disk

File Systems Since Vista SP1, Format wipes while it formats. http://support.microsoft.com/kb/941961 Diskpart.exe > Clean all

File Systems-Vista & Windows 7 NTFS Symbolic links to files, folders, and UNC paths. Beware the Application Data recursion loop. Cf. Link files. Hard links are extensively used (\Winsxs). Disabled by default: Update Last Access Date. Enabled by default: The NTFS Change Journal ($USN:$J). Transactional NTFS ($Tops:$T).

File Systems-Vista & Windows 7 The volume header of an EXFAT volume. Do your forensics tools read EXFAT?

OS Artifacts Applications e.g., I.E., etc. OS Artifacts File Systems NTFS, FAT32, EXFAT Fvevol.sys Mount, Partition & Volume Managers Disk

OS Artifacts Recycle.Bin [Volume]:\$Recycle.Bin $Recycle.Bin is visible in Explorer (view hidden files). Per user store in a subfolder named with account SID. No more Info2 files. When a file is deleted moved to the Recycle Bin it generates two files in the Recycle Bin. $I and $R files. $I or $R followed by several random characters, then original extension. The random characters are the same for each $I/$R pair. $I file maintains the original name and path, as well as the deleted date. $R file retains the original file data stream and other attributes. The name attribute is changed to $R******.ext.

OS Artifacts Recycle.Bin Note the deleted date (in blue).

OS Artifacts Recycle.Bin

OS Artifacts Folder Virtualization Part of User Access Control Standard user cannot write to certain protected folders. C:\Windows C:\Program Files C:\Program Data To allow standard user to function, any writes to protected folders are virtualized and written to C:\Users\[user]\AppData\Local\VirtualStore

OS Artifacts Registry Virtualization Virtualize (HKEY_LOCAL_MACHINE\SOFTWARE) Non-administrator writes are redirect to: HKEY_CURRENT_USER\Software\Classes\VirtualStore\MACHINE\SOFTWARE\ Keys excluded from virtualization HKEY_LOCAL_MACHINE\Software\Classes HKEY_LOCAL_MACHINE \Software\Microsoft\Windows HKEY_LOCAL_MACHINE \Software\Microsoft\Windows NT

OS Artifacts Registry Virtualization Location of the registry hive file for the VirtualStore Is NOT the user s NTUSER.DAT It is stored in the user s UsrClass.dat \Users\[user]\AppData\Local\Microsoft\Windows\UsrClass.dat Investigation of Vista - Windows 2008 R2 requires the investigator to examine at least two account specific registry hive files for each user account. NTUSER.DAT UsrClass.dat

OS Artifacts Libraries

OS Artifacts Libraries \Users\[account]\AppData\Roaming\Microsoft\Windows\Libraries.

OS Artifacts Libraries Libraries are XML files.

OS Artifacts Libraries

OS Artifacts Shell The Recent folder contains link files and two subfolders at \User\[Account]\AppData\Roaming\Microsoft\Windows\Recent.

OS Artifacts Shell

OS Artifacts Shell AutomaticDestination files are in the Structured Storage file format.

OS Artifacts Shell

OS Artifacts Shell

OS Artifacts Chkdsk Logs \System Volume Information\Chkdsk

OS Artifacts Superfetch \Windows\Prefetch

OS Artifacts Volume Shadow Copy Volume shadow copies are bit level differential backups of a volume. 16 KB blocks. Copy on write. Volume Shadow copy files are difference files. The shadow copy service is enabled by default on Vista and Windows 7, but not on Windows 2008 or 2008 R2. Difference files reside in the System Volume Information folder.

OS Artifacts Volume Shadow Copy Shadow copies are the source data for Restore Points and the Restore Previous Versions features. Used in backup operations. Shadow copies provide a snapshot of a volume at a particular time. Shadow copies can show how files have been altered. Shadow copies can retain data that has later been deleted, wiped, or encrypted.

OS Artifacts Volume Shadow Copy Volume shadow copies do not contain a complete image of everything that was on the volume at the time the shadow copy was made.

OS Artifacts Volume Shadow Copy The Volume Shadow Copy difference files are maintained in \System Volume Information along with other VSS data files, including a new registry hive.

OS Artifacts Volume Shadow Copy \System Volume Information\Syscache.hve

OS Artifacts Volume Shadow Copy

OS Artifacts Volume Shadow Copy

OS Artifacts Volume Shadow Copy vssadmin list shadows /for=[volume]:

OS Artifacts Volume Shadow Copy

OS Artifacts Volume Shadow Copy Shadow copies can be exposed through symbolic links. Mklink /d C:\{test-shadow} \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\

OS Artifacts Volume Shadow Copy Volume Shadows can be mounted directly as network shares. net share testshadow=\\.\harddiskvolumeshadowcopy11\

OS Artifacts Volume Shadow Copy >psexec \\[computername] vssadmin list shadows /for=c: >psexec \\[computername] net share testshadow=\\.\harddiskvolumeshadowcopy20\ PsExec v1.94 - Execute processes remotely... testshadow was shared successfully. net exited on [computername] with error code 0. >robocopy /S /R:1 /W:1 /LOG:D:\VSStestcopylog.txt \\[computername] \testshadow D:\vssTest Log File : D:\VSStestcopylog.txt...

OS Artifacts Volume Shadow Copy Other ways to call shadow copies: \\localhost\c$\users\troyla\downloads ( Yesterday, July 20, 2009, 12:00 AM) \\localhost\c$\@gmt-2009.07.17-08.45.26\?

OS Artifacts Volume Shadow Copy Shadow copies can be imaged. C:\Users\Troyla\Desktop\fau-1.3.0.2390a\fau\FAU.x64>dd if=\\.\harddiskvolumeshadowcopy11 of=e:\shadow11.dd localwrt The VistaFirewall Firewall is active with exceptions. Copying \\.\HarddiskVolumeShadowCopy11 to E:\shadow11.dd Output: E:\shadow11.dd 136256155648 bytes 129943+1 records in 129943+1 records out 136256155648 bytes written Succeeded! C:\Users\Troyla\Desktop\fau-1.3.0.2390a\fau\FAU.x64>

OS Artifacts Volume Shadow Copy Images of shadow copies can be opened in forensics tools and appear as logical volumes.

OS Artifacts Volume Shadow Copy Data that has been deleted can be captured by shadow copies and available for retrieval in shadow copy images.

OS Artifacts Volume Shadow Copy Every shadow copy data set should approximate the size of the original volume. Amount of case data=(number of shadow copies) x (size of the volume)+(size of the volume). 10 shadow copies = 692 GB

Applications I.E. 8 Applications e.g., I.E., etc. OS Artifacts File Systems NTFS, FAT32, EXFAT Fvevol.sys Mount, Partition & Volume Managers Disk

Applications I.E. 8 "C:\Program Files (x86)\internet Explorer\iexplore.exe" -private

Applications I.E. 8 Cache data appears to be written, then deleted.

Applications I.E. 8 Residual cache files from InPrivate browsing.

Applications I.E. 8 Tab and session recovery a new source for historical browsing information. \User\[Account]\AppData\Local\Microsoft\Internet Explorer\Recovery

Applications I.E. 8 Recovery file: Note the Structured Storage file format.

Applications I.E. 8

2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.