Operating Systems Forensics



Similar documents
1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer

A FORENSIC ANALYSIS OF THE WINDOWS REGISTRY

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

Registry Analysis SANS Forensic Summit 2009

Installing a Second Operating System

APPENDIX I Basic Windows NT Server 4.0 Installation and Configuration

MCSE TestPrep: Windows NT Server 4, Second Edition Managing Resources

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems

Incident Response and Computer Forensics

ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT

Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012

Computer Forensics Principles and Practices

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Paul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana USA

Windows NT Server Operating System Security Features Carol A. Siegel Payoff

Pearl Echo Installation Checklist

Introduction p. 1 Approach to the Book p. 2 At Least Three Ways to Do It p. 2 Where to Find the Tools p. 3 Running Tools with Alternate Credentials

Microsoft" Windows8 Home Server

6 USING WINDOWS XP 6.1 INTRODUCTION

Managing and Supporting Windows XP Chapter #16

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1

VERITAS Backup Exec TM 10.0 for Windows Servers

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure

Chapter 4. System Software. What You Will Learn... Computers Are Your Future. System Software. What You Will Learn... Starting the Computer

EnCase 7 - Basic + Intermediate Topics

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Chapter 5: Operating Systems Part 1

What is Digital Forensics?

Southern Maine Community College Computer Technology Professor Howard Burpee. Installing Windows 7

Using WMI Scripts with BitDefender Client Security

Imaging License Server User Guide

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Cloning Utility for Rockwell Automation Industrial Computers

Advanced Registry Forensics with Registry Decoder. Dr. Vico Marziale Sleuth Kit and Open Source Digital Forensics Conference /03/2012

MICROS e7 Credit Card Security Best Practices

Server & Workstation Installation of Client Profiles for Windows

After going through this lesson you would be able to:

Determining VHD s in Windows 7 Dustin Hurlbut

Windows 7: Current Events in the World of Windows Forensics

Ekran System Help File

Moving the TRITON Reporting Databases

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

New Technologies File System (NTFS) Priscilla Oppenheimer. Copyright 2008 Priscilla Oppenheimer

Chapter 5: Fundamental Operating Systems

Course overview. CompTIA A+ Certification (Exam ) Official Study Guide (G188eng verdraft)

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

AdminToys Suite. Installation & Setup Guide

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)

FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION

Forensically Determining the Presence and Use of Virtual Machines in Windows 7

Windows 7 Forensic Analysis. H. Carvey Chief Forensics Scientist, ASI

Advanced Diploma In Hardware, Networking & Server Configuration

AccuGuard Desktop and AccuGuard Server User Guide

3 Setting up Databases on a Microsoft SQL 7.0 Server

CSN08101 Digital Forensics Lecture 10: Windows Registry. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

GIGATRAK CLIENT INSTALL HANDHELD TERMINAL

Abila MIP. Installation Guide

Avalanche Remote Control User Guide. Version 4.1.3

CITRIX 1Y0-A14 EXAM QUESTIONS & ANSWERS

WhatsUp Gold v16.3 Installation and Configuration Guide

Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)

Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform

Detection of Data Hiding in Computer Forensics. About Your Presenter

The Windows File Articles -> Software Oct , 00:45 (UTC+0)

Qsync Install Qsync utility Login the NAS The address is :8080 bfsteelinc.info:8080

Topaz Installation Sheet

Understanding Backup and Recovery Methods

Maintaining the Content Server

Incident Response and Forensics

IT Networking and Security

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

HoneyBOT User Guide A Windows based honeypot solution

PRIVAZER USER GUIDE Version 1.2 Dated 08 June 2013

Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide

Abila MIP. Installation User's Guide

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.

Nortel Networks Call Center Reporting Set Up and Operation Guide

WhatsUp Gold v16.1 Installation and Configuration Guide

COURCE TITLE DURATION CompTIA A+ Certification 40 H.

Contents. Supported Platforms. Event Viewer. User Identification Using the Domain Controller Security Log. SonicOS

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On

Lab: Data Backup and Recovery in Windows XP

Installation Instruction STATISTICA Enterprise Small Business

Operating Systems. and Windows

GUARD1 PLUS SE Administrator's Manual

Web Service for Observer. Installation Manual. Part No Revision A

P2V Best Practices. Joe Christie Technical Trainer

NComputing vspace Server 8.3 for Windows. Software and Firmware Upgrade Guide. Document version 1.2

User Manual. Copyright Rogev LTD

Transcription:

Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos

Summary! Windows boot sequence! Relevant Windows data structures! Windows artifacts of user activities 2

Remember were we are! Looking for evidence in networked computers file! Previously, we focused on disk forensics! Allows us to learn about the persistent state of a computer message 3

The persistent state holds a lot of information! Information handled by applications! E.g., documents, videos, images, etc.! Information handled by the operating system! E.g., logs, system configurations, file system meta-data, etc. Software Application Application Application Operating System Hardware CPU RAM Disk 4

Our focus now: Operating systems forensics 2. Operating system forensics 1. Disk forensics Software Application Application Application Operating System Hardware CPU RAM Disk 5

Importance of operating system forensics! Ultimately, in a forensic examination, we re investigating the actions of a person! Almost every event or action on a system is the result of a user either doing something (or not doing something)! Many events change the state of the operating system (OS) 3) OS forensics 1) action! OS forensics helps understand how system changes correlate to events resulting from the actions of somebody in the real world 2) OS state change! 6

Example: Modeling an arms trafficking scenario Mr. Victor s desktop and smartphone! Mr. Victor is a suspect of smuggling weapons on an online marketplace! He has a desktop computer and a mobile phone Mr. Victor s home network Cellular Net! We want to collect useful OS artifacts that can be used as evidence E-commerce Web site Internet 7

Our target: Windows! Goal: extract and interpret data of investigative value from computers running Windows operating systems! There are many versions of windows out there! Some of the older versions are outdated and are no longer used: Windows 9x, NT, ME, 2000! In home, corporate, and government environments it s far more likely to find newer versions: >= Windows XP! We will cover the newer recent versions of Windows, focusing on their common features 8

Windows boot sequence 9

Motivation example: From the case files A recent examination of a server and analysis of its web logs confirmed that the system had indeed been compromised. The logs provided a suspicious IP address, the operating system used in the compromise (Windows XP), and the suspect s web browser. The IP address led investigators to an ISP, and eventually to a suspect in the intrusion. However, the suspect denied all involvement in the compromise and stated that this computer was running Windows 98 (as has always been the case). This was of course discouraging news for investigators, who were sure they had their man. Investigators began forensics examination of the suspect s computer A search of the hard drive revealed a deleted boot.ini file that appeared to have been deleted mere days after the compromise of the web server, clearly showing that Windows XP Professional had been installed on the system, thereby punching a hole in the suspect s story 10

Windows startup: Why relevant for forensics? 1. Interrupt the boot process to view and document the CMOS configuration 2. Explain which files were altered in the startup process! E.g., if an evidentiary system was accidentally booted, demonstrate that no user-created files were modified 3. Determine which version of the OS was running and when was installed 4. Examine the startup process for signs of tampering! E.g., important when investigating malware 11

Startup in Windows NT and later! All NTFS computers perform the following steps when the computer is turned on: 1. Power-on self test (POST) 2. Initial startup 3. Boot loader 4. Hardware detection and configuration 5. Kernel loading 6. User logon Windows-specific code 12

Contamination concerns with Windows XP! When you start a Windows XP NTFS workstation, several files are accessed immediately! The last access date and time stamp for the files change to the current date and time! May destroy any potential evidence! E.g., that shows when a Windows workstation was last used! Determining which files are changed upon startup and shutdown can be done using some forensic tools! http://forensicswiki.org/wiki/files_changed_at_boot:windows_xp 13

Relevant Windows data structures 14

Relevant Windows data structures! NTFS! Windows Registry! Windows Event Log 15

Windows Registry! The Registry is the heart and soul of Windows OSes and a wealth of information can be recovered:! System configuration! Devices on the system! User names! Personal settings and browser preferences! Web browsing activity! Files opened! Programs executed! Passwords 16

Registry s official definition! Microsoft defines the Registry thus: A central hierarchical database used in Microsoft Windows 9x, Windows CE, Windows NT, and Windows 2000 used to store information necessary to configure the system for one or more users, applications and hardware devices. https://support.microsoft.com/en-us/kb/256986 17

Registry access activity! Virtually everything done in Windows refers to or is recorded into the Registry! The RegMon program can be used to display registry activity in real time! Registry access barely remains idle: the registry is referenced in one way or another with every action taken by the user 18

Structure of the Windows Registry! The Registry can be seen as a unified file system 19

Registry hives! A hive is a logical group of keys, subkeys, and values in the registry that has a set of supporting files containing backups of its data! Each time a new user logs on, a new hive is created for that user with a separate file for the user profile! User's app settings, desktop, environment, network connections, and printers! User profile hives are located under the HKEY_USERS key! 'HKEY is an abbreviation for Handle to a Key 20

Some important hives Filename Location Content ntuser.dat ach user has an individual user.dat file in windows\profiles\user account \Documents and Settings \user account Protected storage area for user Most Recently Used (MRU) files User preference settings Default \Windows\system32\config System settings SAM \Windows\system32\config User account management and security settings Security \Windows\system32\config Security settings Software \Windows\system32\config All installed programs and their settings System \Windows\system32\config System settings 21

Relevant Windows data structures! NTFS! Windows Registry! Windows Event Log 22

Windows Event Log! Whenever an event, such as a user logging on or off, occurs, the operating system logs the event! An event can be any occurrence that the OS or a program wants to keep track of or alert the user about! Windows has a centralized log service to allow apps and OS to report events that have taken place! Application (example: Database message)! System (example: driver failure)! Security (example: Logon attempt, file access) 23

Structure of the Event Log! The Event Log can be seen using a specific system tool 24

! Events have a specific format and meaning Event format 25

Example of detailed event tracking! Detailed Event tracking can include the following events:! #528 Successful Login (The user authenticate to the system)! #592 A new process has been created (application is launched)! #560 Object Open (a file is requested)! #567 Object Access (the file is modified and saved)! #564 Object Deleted! #562 Handle Closed (the file has been closed)! #593 A Process Has Exited (the application was terminated) 26

Windows artifacts of user activities 27

Where to find information about user activities! Volatile information! Open network connections! Running processes! Underlined: covered when we discussed file system forensics! Non-volatile information! Hidden files! Slack space! Swap files! Index.dat files! Windows Search index! Unallocated clusters! Unused partitions! Hidden partitions! Registry settings! Windows event logs! 28

MRU lists! MRU ('most recently used ) lists contain entries made due to specific actions performed by the user! There s numerous MRU lists located throughout various Registry keys RunMRU: When a user types a command into the 'Run' box via the Start menu, the entry is added to this Registry key 29

MRU lists: Another example! BagMRU: contains information of last visited folders 30

MRU lists: Examples 31

UserAssist! UserAssist key: indicate last accessed system objects! E.g., Control Panel applets, shortcut files, programs, etc.! HCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist; 32

UserAssist (cont.)! We can gain a better understanding of what types of files or applications have been accessed on a particular system, e.g.:! The decoded value shows a potential amount of information:! name of user profile - 'Cpt. Krunch' - from which the.exe was executed! researching 'p2ktools.exe', it is used for managing Motorola cell phones! user has p2ktools folder in parent directory called 'Razor programs! tells both location and indicator that the suspect has a Motorola Razor cell phone 33

Autorun locations! Registry keys that launch programs or apps during boot! E.g., in a system intrusion, autorun locations could reveal the installation of a trojan backdoor! List of common autorun locations: HKLM\Software\Microsoft\Windows\CurrentVersion\Runonce; HKLM\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run; HKLM\Software\Microsoft\Windows\CurrentVersion\Run; HKCU\Software\Microsoft\Windows;NT\CurrentVersion\Windows\Run; HKCU\Software\Microsoft\Windows\CurrentVersion\Run;; HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce; (ProfilePath)\Start;Menu\Programs\Startup; 34

USB devices! Anytime a device is connected to the Universal Serial Bus (USB), drivers are queried and the device's information is stored into the Registry (i.e., thumb drives) 35

Application-specific information! E.g., the Internet Explorer uses the Registry a lot! Under the HKCU\Software\Microsoft\Internet;Explorer;key 36

Application-specific information (cont.)! From previous example, an examiner could conclude:! the user possibly has a gmail and hotmail email address! engages in online banking at tdbanknorth! is interested in digital forensic websites! perhaps go to college at Champlain! has been researching apartments in the area! 37

! System information! Computer name, OS version, last shutdown time! Time zone information! important for establishing a timeline of activity on the system! Wireless SSIDs! list of service set identifiers (SSIDs) to which it has connected! Shares! Remotely shared resources, e.g., disk volumes (can be hidden) More Registry artifacts! Audit policy! Indicates types of events recorded in the Event Log! Mounted devices! Information about devices and volumes mounted on NTFS! Users! account creation time, names, last login time, last failed login attempt, account expiration, etc.! 38

! System information! Computer name, OS version, last shutdown time More Registry artifacts! Audit policy! Indicates types of events recorded in the Event Log! Time zone information! important for establishing a timeline of activity on the system! Wireless SSIDs! list of service set identifiers (SSIDs) to which it has connected! Shares! Remotely shared resources, e.g., disk volumes (can be hidden) Homework! Mounted devices! Information about devices and! Users volumes mounted on NTFS! account creation time, names, last login time, last failed login attempt, account expiration, etc. Locate the Registry keys where this information can be found.! 39

Recycle Bin! The Recycle Bin allows user to retrieve and restore files that have been deleted! The user s deleted file is placed within the file under a subdirectory named with the user s security ID, e.g.,! C:\RECYCLER\S-1-5-21-1454471165-630328440-725345543-1003 40

! Link files Interesting files!.lnk files: shortcuts that point to another file or folder! May indicate the user opened a file; contains file s details! Prefetch files!.pf files are a specialized file type, to speed up the running of programs! Contains info about the last time the program was executed! Installed programs! Thumbnail cache files! thumbs.db: thumb cache of files browsed in the Thumbnails view! Printer files! Contain information about printing jobs! Pagefile.sys and Hiberfil.sys! The swap file and the file for storing RAM contents upon hybernation 41

Conclusions! Windows is the most widely available operating system on desktop platforms! Due to its central role in setting up and supervising the system, Windows maintains valuable data structures for forensic investigators: the Registry, and the Event Log! By analyzing these data structures, we can gather a wealth of information about user activities on a computer 42

References! Primary bibliography! Harlan Carvey, Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, 1 st Edition 43

Next class! Network forensics 44