Vista Log Forensics. Dr. Rich Murphey, ACS Background Case Study. Engagement Preliminary Report Final Report Vista Event Logging



Similar documents
Automated Windows Event Log Forensics

1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer

Host-based Intrusion Prevention on Windows and UNIX. Dr. Rich Murphey White Oak Labs

Chapter 5: Operating Systems Part 1

TZWorks Windows Event Log Viewer (evtx_view) Users Guide

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Backup and Recovery Procedures

Installing a Second Operating System

Basic ShadowProtect Troubleshooting

The Meaning. Linkfiles In Forensic Examinations

RECOVERING FROM SHAMOON

Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

VX Search File Search Solution. VX Search FILE SEARCH SOLUTION. User Manual. Version 8.2. Jan Flexense Ltd.

Zmanda Cloud Backup Frequently Asked Questions

PARALLELS SERVER BARE METAL 5.0 README

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

Tivoli Storage Manager Lunch and Learn Bare Metal Restore Dave Daun, IBM Advanced Technical Support

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

How to troubleshoot Microsoft Volume Shadow copy Service errors

Active Directory 2008 Operations

DISK DEFRAG Professional

The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices

IT Essentials v4.1 LI Upgrade and configure storage devices and hard drives. IT Essentials v4.1 LI Windows OS directory structures

VisionMate Flat Bed Scanner 2D Tube Barcode Reader

Using WMI Scripts with BitDefender Client Security

H A N D L E I D I N G ONLINE BACKUP VSS - troubleshooting

Windows Server 2008 R2 Essentials

Gladinet Cloud Backup V3.0 User Guide

Database Administration

IBM Security QRadar Version WinCollect User Guide V7.2.2

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Eventlog to Syslog v4.5 Release 4.5 Last revised September 29, 2013

User Guide. CTERA Agent. August 2011 Version 3.0

User Manual. Copyright Rogev LTD

HP A-IMC Firewall Manager

PARALLELS SERVER 4 BARE METAL README

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

Understanding Backup and Recovery Methods

EMC NetWorker VSS Client for Microsoft Windows Server 2003 First Edition

Eloquence Training What s new in Eloquence B.08.00

HP IMC Firewall Manager

IBM Rapid Restore PC powered by Xpoint - v2.02 (build 6015a)

EMC RepliStor for Microsoft Windows ERROR MESSAGE AND CODE GUIDE P/N REV A02

Windows security for n00bs part 1 Security architecture & Access Control

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

Support Document: Microsoft SQL Server - LiveVault 7.6X

Installation and User Guide for Partners and Businesses

Overview. Timeline Cloud Features and Technology

LTFS for Microsoft Windows User Guide

IFSM 310 Software and Hardware Concepts. A+ OS Domain 2.0. A+ Demo. Installing Windows XP. Installation, Configuration, and Upgrading.

EVENT LOG MANAGEMENT...

The Carbonite Appliance HT10 User Guide

Microsoft Vista: Serious Challenges for Digital Investigations

UNDELETE 7.0 USER GUIDE

Zinstall HDD User Guide

BEST PRACTICES GUIDE: VMware on Nimble Storage

SQL Server Database Administrator s Guide

IBM TSM for SharePoint 6.1 VSS Backup and Restore Solution Guide IBM System Storage DS6000 & DS8000 with DocAve

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

CTERA Agent for Windows

CTERA Agent for Windows

Datagram. Datagram SyslogAgent manual. Version 3.6

Windows 7: Current Events in the World of Windows Forensics

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

Cache Configuration Reference

Oracle 11g Database Administration

Using Process Monitor

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Internet Information Services Agent Version Fix Pack 2.

Backing Up and Recovering Your Server

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

Actualtests.com - The Power of Knowing

Backup & Recovery. 10 Suite PARAGON. Data Sheet. Automatization Features

How To Understand The Error Codes On A Crystal Reports Print Engine

C6 Easy Imaging Total Computer Backup. User Guide

Monitoring App V eg Enterprise v6

HarePoint Workflow Scheduler Manual

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue:

MOC 20462C: Administering Microsoft SQL Server Databases

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft Applications Release 2.3. Application Guide P/N REV A02

FTP Client Engine Library for Visual dbase. Programmer's Manual

Acer erecovery Management

Backup Exec System Recovery 7.0 Best Practices

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

VSS installation and application

Known Issues and Work Around

How To Use A Microsoft Networker Module For Windows (Windows) And Windows 8 (Windows 8) (Windows 7) (For Windows) (Powerbook) (Msa) (Program) (Network

Microsoft SQL Server 2008 Administrator's Pocket Consultant

Installation Instruction STATISTICA Enterprise Small Business

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)

Land Information New Zealand (LINZ) SALT Database. Migration from original hardware to virtualised hardware: Process Documentation

Windows NT File System. Outline. Hardware Basics. Ausgewählte Betriebssysteme Institut Betriebssysteme Fakultät Informatik

Acronis Backup & Recovery 11.5

SOLUTION GUIDE AND BEST PRACTICES

Acronis Backup & Recovery 11

Dr.Backup Release Notes - Version

Transcription:

Session 1 Session 2 Session 64 Vista Log Forensics Dr. Rich Murphey, ACS Background Case Study Engagement Preliminary Report Final Report Vista Event Logging Logging Service Vista Event Encoding Undocumented Internals Event Log Analysis Recovery Correlation Interpretation Shadow Copy Services Enable/Disable Provider A Provider B Controller Controller Buffers Session Control Events Provider C Windows Kernel Events Log files Logged Events Real time delivery Consumer Consumer Recover Repair Correlate 1

Acknowledgements Dedicated to: BitMonk (HTA/Ad Hoc) Thanks to: Jerlyn Mardis, ACS Josh Pennell, IO Active Matthew Geiger, CERT Shouts out to: MD5, Caesar HTA Fednaughty DT 2

Sponsor: Special Thanks To Forensics In-depth Analysis, Expert Witness Data Recovery Complex RAID, Exotic File Systems Consulting Information Security This is not: Legal Advice Suitable for testimony 3

Experience: Rice University Ph.D. Electrical and Computer Engineering UTMB Med. School Faculty, Physiology & Biophysics Pentasafe Security Chief Scientist Applied Cognitive Soln. Chief Scientist Expert Witness CISSP, ACE, EnCE An Author of: GNU Graphics Asterisk VOIP See Authors FreeBSD Rich Murphey Founding Core Team XFree86 man xorg grep Rich 4

For More Info C. R. Murphey, Automated Windows Event Log Forensics, Digital Investigation, August 2007 A peer-reviewed paper on a new tool for automating XP log recovery and analysis Digital Forensic Research Workshop, 8/13/07 HTCIA National 8/27/07 5

Session 1 Session 2 Session 64 Background Case Study Engagement Preliminary Results Revised Scope Vista Event Logging Events Logging Service Undocumented Internals Event Log Analysis Recovery Correlation Report Shadow Copy Services Enable/Disable Provider A Provider B Controller Controller Buffers Session Control Events Provider C Windows Kernel Events Log files Logged Events Real time delivery Consumer Consumer Recover Roadmap Repair Correlate 6

Case Study Steps Step 1: Define Preliminary Scope Define feasibility of the engagement. Step 2: Preliminary Report Uncover and mitigate surprises. Define capability to answer questions. Step 3: Final Report In-depth coverage. Adapt methods to answer questions. 7

Officer/Director calls 1 st Hurdle: Define a Scope Something bad happened. Possible contract violation. Outgoing transfer of proprietary documents. #1: Define a scope of work. Can we identify file transfer? Examine hard drives Email attachments File transfer, uploads Anything else? 8

Good news: We know what to look for. Well defined keywords, file names #2: Preliminary Report D:\OfInterest.doc In unallocated space. 2 nd Hurdle: Preliminary Report Bad News: IT deleted the user profile, and gave laptop to a new employee, six months ago, after they reformatted and reinstalled Windows Vista. 9

Shortcuts may contain IDs, label, size Shortcut File Shortcuts A snapshot of file s attributes, media s attributes Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov 11 2006 E2C3-F184 1643743 11/11/2006 3:21:14 PM 11/3/2006 10:12:34 AM N/A 10

3 rd Hurdle: Final Report How to identify outgoing file transfer? Data carve for file path, time. Where to find time stamps? Event logs Internet history Shortcuts Any where else? 11

Session 1 Session 2 Session 64 Background Case Study Engagement Preliminary Results Revised Scope Vista Event Logging Events Logging Service Undocumented Internals Event Log Analysis Recovery Correlation Report Shadow Copy Services Enable/Disable Provider A Provider B Controller Controller Buffers Recover Session Control Events Provider C Windows Kernel Repair Correlate Roadmap Events Log files Logged Events Real time delivery Consumer Consumer 12

Shortcuts may contain IDs, label, size Shortcut File Shortcuts A snapshot of file s attributes, media s attributes Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov 11 2006 E2C3-F184 1643743 11/11/2006 3:21:14 PM 11/3/2006 10:12:34 AM N/A 13

Windows Vista/2008 Event Logging Time, SID, Source, Severity, Message More than 50 logs by default. C:/Windows/system32/winevt/Logs/ Application.evtx HardwareEvents.evtx Internet Explorer.evtx Security.evtx Setup.evtx System.evtx. 50 more! 14

Component Architecture User Mode System Threads System Processes Services Applications Service Control Mgr. LSASS WinLogon Session Manager SvcHost.Exe WinMgt.Exe SpoolSv.Exe Services.Exe NTDLL.DLL Task Manager Explorer User Application Subsystem DLLs Events Environment Subsystems POSIX OS/2 Windows Backward Compatibility Occurs Here Kernel Mode I/O Mgr Device & File Sys. Drivers File System Cache Object Mgr. Plug and Play Mgr. System Service Dispatcher (kernel mode callable interfaces) Power Mgr. Security Reference Monitor Virtual Memory Processes & Threads Configuration Mgr (registry) Local Procedure Call Windows USER, GDI Graphics Drivers Kernel Hardware Abstraction Layer (HAL) hardware interfaces (buses, I/O devices, interrupts, interval timers, DMA, memory cache control, etc., etc.) PDC 06 15

Backward Compatibility? Backward Compatibility 16

Vista Event Logging 5% CPU for 20K events/sec, 200K w/transactions Logging and WMI are now just layers on top of ETW Unified: kernel/app, tracing/logging, remote/local Enable/Disable Controller Session Control Events Windows Kernel Session 1 Buffers Session 2 Session 64 Log files Logged Events Provider A Provider B Events Provider C Real time delivery Consumer Consumer PDC 06 17

Session 1 Session 2 Session 64 High performance tracing Event Tracing for Windows (ETW) Events from both apps and kernel Provider A Vista Logging Service Enable/Disable Buffers Provider B Controller Controller Session Control Events Provider C Windows Kernel Real time delivery Consumer Consumer Events Log files Logged Events Events are forwarded to a Collector Service and stored in local log for consumption Buffered in kernel Dynamically enable/disable No reboot or restart Selected events are delivered as they arrive Choose either push or pull subscription 18

Events are XML! Standards encoding System: standard properties EventData: app. defined Get events via: Query live logs & log files Subscribe to live logs Filter using XPath Internals: New, different encoding Arbitrary structure defined by each application Vista Events <Event> <System> <Provider Name="CD Burning Service" /> <EventID>310</EventID> <Level>2</Level> <Version>0</Version> <TimeCreated SystemTime="2006-02- 28T21:51:44.754Z" /> <EventRecordID>7664</EventRecordID> <Channel>Application</Channel> <Computer>Desktop9237</Computer> <Security UserID="S-1-...-1003" /> </System> <EventData> <data name= control > Service Started. </data> </EventData> </Event> Events are encoded not as XML, but rather BXML! PDC 06 19

Vista Events On the outside <Event> <System> <Provider Name="CD Burning Service" /> <EventID>310</EventID> <Level>2</Level> <Version>0</Version> <TimeCreated SystemTime="2006-02- 28T21:51:44.754Z" /> <EventRecordID>7664</EventRecordID> <Channel>Application</Channel> <Computer>Desktop9237</Computer> <Security UserID="S-1-...-1003" /> </System> <EventData> <data name= control > Service Started. </data> </EventData> </Event> On the inside Record Header Section Descriptor Section Descriptor Section Descriptor Section Header Section Body Section Header Section Body Section Header Section Body PDC 06 20

Record header Common attributes Timestamp, severity Number of sections Section descriptors Source Offset, length Section headers Specifies encoding of body Section body event specific data Undocumented Event Structure Record Header Section Descriptor Section Descriptor Section Descriptor Section Header Section Body Section Header Section Body Section Header Section Body 21

Binary XML BXML (Binary extensible Markup Lang.) A binary serialization of an XML document. developed by CubeWerx for OpenGIS Consortium. Higher performance in both space and time. More compact. String table for tags and values. Gzip whole doc or just body. Avoids resource exhaustion of DOM. 10 to 100 times faster to parse. 100 times faster for dense numeric data due to binary encoding of numbers alone. http://www.cubewerx.com 22

What is BXML? Serialized numbers begins a one byte code that identifies the data type. byte enum ValueType { BoolCode = 0xF0, ByteCode = 0xF1, IntCode = 0xF4, } // boolean value // 'byte' numeric value // 'int' numeric value IntNum { // 32-bit integer value ValueType type = IntCode; int num; // value } http://www.cubewerx.com 23

What is BXML? XML tags are serialized as a byte code for the type of tag, followed by a reference to the tag name in the string table. ContentElementToken { } // <element> TokenType type = ContentElementCode; Count stringref; // index of element name ElementEndToken { // </element> TokenType type = ElementEndCode; } http://www.cubewerx.com 24

What is BXML? Strings are preceeded by their length. String tables are preceeded by type code and table size. String { // raw character string Count bytelength; // length in bytes byte chars[bytelength]; // characters in proper encoding } StringTableToken { // string table (fragment) TokenType type = StringTableCode; Count nstrings; // number of strings String strings[nstrings]; // values } 25

Why the changes? Performance, scalability, and security New event publishing API Schematized, discoverable, structured events Unified API logging uses tracing framework Logging is asynchronous Does not block the application Log size limit removed limited only by disk space Record Header Section Descriptor Section Descriptor Section Descriptor Section Header Section Body Section Header Section Body Section Header Section Body 26

XML events have rich information XP Events have flat structure, no parameter names Filtering and Subscriptions XPath Event[System/EventID=101] Select events - filter out noise <QueryList> <Query> <Select>Event[System/Provider=Foo]</Select> <Suppress>Event[System/Level>2]</Suppress> </Query> </QueryList> Filter across live logs, files, Vista, and XP Subscribe to a custom view of events centrally Integrates with existing tools Triggering Actions Associate a task with an event with a single click Vista Events 27

Vista Log Signature Vista Log Signature 4K Header starts with ElfFile Each 64K block starts with ElfChnk Size: 1024 + 4 = 1028 K bytes 28

Registering a Provider Providers are sources of the events Identified by unique GUID and name Specifies the location of resources for decoding <provider name="microsoft-windows-demonstration" guid="{12345678-d6ef-4962-83d5-123456789012} resourcefilename="wevtsvc.dll" messagefilename="wevtsvcmessages.dll" parameterfilename="wevtsvcparameter.dll" > PDC 06 29

Channel Definition System-defined channels are imported (System channel above) New provider-specific channels can be defined and configured <importchannel chid="c1" name="system" /> <channel chid="c2" name="microsoft-windows- Demonstration/Operational type="operational" isolation="system"> <logging> <autobackup>true</autobackup> <maxsize>268435456</maxsize> </logging> <publishing> <level>2</level> <keywords>1</keywords> </publishing> </channel> PDC 06 30

Template Definition Templates define the payload shape of events Data elements define fields of events Can add user-defined XML representation for the payload <templates> <template tid="tid_helloworld"> <data name="greeting" intype="win:unicodestring" outtype="xs:string" /> </template> </templates> PDC 06 31

Event Manifest defines event attributes: ID (value), version, keywords, task, opcode, and level References previously declared template that defines instance data Message - a user readable string Channel - the name of the channel that transports the event to logs <event value="101" version="1" level="win:error" symbol= MyEventDescriptor keywords="el:availability task="el:eventprocessing" template= tid_helloworld" channel= C1" message="$(string.helloworld.message)" /> PDC 06 32

How to log an event: Logging Interface Event publishing application At compile time Write a schema Compile schema At run time Register source Create a session Send events Published Events Publishing API User mode Kernel mode Publishing API Published Events Kernel Component Schema compiler Event Schema Sessions session Logs Publisher PDC 06 33

Session 1 Session 2 Session 64 Background Case Study Engagement Preliminary Results Revised Scope Vista Event Logging Events Logging Service Undocumented Internals Event Log Analysis Recovery Correlation Report Shadow Copy Services Enable/Disable Provider A Provider B Controller Controller Buffers Recover Session Control Events Provider C Windows Kernel Repair Correlate Roadmap Events Log files Logged Events Real time delivery Consumer Consumer 34

Conduct Cutting-Edge Cutting-Edge Forensics Forensic Investigations back cover On Event Log Repair: We found no methods that were complete, and none explained the underlying principles for why the repair was needed. pg. 444 Available April 2, 2007 35

For More Info C. R. Murphey, Automated Windows Event Log Forensics, Digital Investigation, August 2007 A peer-reviewed paper on a new tool for automating XP log recovery and analysis Digital Forensic Research Workshop, 8/13/07 HTCIA National 8/27/07 36

Forensic Process Models Log Analysis Roadmap Recover Repair Extract Correlate Analyze Interpret 37

Forensic Process Models Log Analysis Roadmap Recover Repair Extract: Step 1 Recover Data Carve for Logs, etc. Correlate Step 2 Validate Identify intact log files. Step 3 Correlate Corresponding time, files, names, Analyze Interpret 38

Using DataLifter: 39

XP log signature 16 bytes 30 00 00 00 4c 66 4c 65 01 00 00 00 01 00 00 00 Signatures Vista log signature 16 bytes ElfFile padded with nulls 40

Step 1 Recover The Results: Step 1 Recover Run DataLifter 100 logs are recovered. Only two are viewable. 98 corrupt logs Step 2 Validate 98 logs? 41

New: Views, Filters Vista Event Viewer 42

SQL queries to identify patterns Recover Correlate Repair <QueryList> <Query> Time (UTC) 11/11/2006 15:21 11/11/2006 15:21 11/11/2006 15:22 11/11/2006 15:23 11/11/2006 15:24 11/11/2006 15:25 11/11/2006 15:26 11/11/2006 15:27 11/11/2006 15:27 <Select Path= System > *[System/Provider= CD Burning Service ]</Select> </Query> </QueryList> Correlate Message The CD Burning service was successfully sent a start control. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the stopped state. 43

Shortcuts may contain IDs, label, size Shortcut File Shortcuts A snapshot of file s attributes, media s attributes Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov 11 2006 E2C3-F184 1643743 11/11/2006 3:21:14 PM 11/3/2006 10:12:34 AM N/A 44

Correlations indicate A CD-ROM was burned Recover Report Repair By username: Bob At: 11/11/2006 3:21 PM UTC Correlate We can uniquely identify the CD Label: Nov 11 2006 Volume serial number: E2C3-F184 Proprietary documents were transferred. OfInterest.doc, 1.6Mb Last Modified 11/3/2006 10:12:34 AM UTC 45

Shortcuts may contain IDs, label, size Shortcut File Shortcuts A snapshot of file s attributes, media s attributes Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov 11 2006 E2C3-F184 1643743 11/11/2006 3:21:14 PM 11/3/2006 10:12:34 AM N/A 46

Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov 11 2006 E2C3-F184 1643743 11/11/2006 3:21:14 PM 11/3/2006 10:12:34 AM N/A Timestamp Analysis Last write time is earlier than created. Created 11/11/2006 3:21:14 PM Last write 11/3/2006 10:12:34 AM Can indicate the time at which a file was transferred from source media. Can help identify the source file on source media. 47

Session 1 Session 2 Session 64 Background Case Study Engagement Preliminary Results Revised Scope Vista Event Logging Events Logging Service Undocumented Internals Event Log Analysis Recovery Correlation Report Shadow Copy Services Enable/Disable Provider A Provider B Controller Controller Buffers Recover Session Control Events Provider C Windows Kernel Repair Correlate Roadmap Events Log files Logged Events Real time delivery Consumer Consumer 48

"Shadow Copy tracks your every change." Automatic point-in-time copies. Incremental block level differences minimize space. Deletes older copies as needed for space (LRU). X 49

Legal Concerns Related to Vista Revised Federal Rules of Civil Procedure Scope of Production Historical snapshots are readily available in Vista Duty to Preserve Litigation Hold Notices Potential for Sanctions Form of Production Native files? Metadata? Point-in-time Image Snapshots? 50

Impact on Policy Maintenance May Complicate Corporate Policy Issues Document retention policies Complicates policy maintenance Disabling shadow copies in turn breaks backups, restore engine Metadata retention policy Ownership changes are visible now Gaps in documentation policy for Vista 51

Impact of Vista on Forensics FRCP: The rules have changed. Vista, in turn, changes the rules. What happens if one accepts the default system behavior? Things may never go away permanently. Vista leaves far more information than XP Changes in ownership (SID) Executives dislike surprises Risks regarding SOX compliance and litigation. 52

Acts like block device How Shadow Copy Works A layer between the device and file system File System Blocks Volume Shadow Copy (VSS) Service Blocks Block Device (disk) Current File System Snapshot as of Wed. 7:00 Snapshot as of Wed. 10:00 Snapshot as of Wed. 13:00 Snapshot as of Wed. 15:00 Snapshot as of Wed. 19:00 53

Shadow Copies Application writes data to disk Disk Before Upon write, overwritten block moves to shadow copy Shadow Before Disk After shadow copy holds only blocks that changed. Shadow After Stevenson, WinHec 06 54

Enabling Shadow Copies 55

Enabling Shadow Copies 56

57

58

59

60

61

62

63

Stevenson, WinHec 06 64

Stevenson, WinHec 06 65

Windows RE Auto-Repair Boot manager detects failure Fail over into Windows RE Computer Bluescreens Reboot Auto-launch Startup Repair No Windows Vista starts Yes Successful boot? >5 attempts? Yes Reboot Diagnose and repair computer No Cannot auto-repair (try manual) Stevenson, WinHec 06 66

Stevenson, WinHec 06 67

Tools - VSSAdmin C:\>vssadmin /? vssadmin 1.1 - Volume Shadow Copy Service administrative commandline tool (C) Copyright 2001 Microsoft Corp. ---- Commands Supported ---- Add ShadowStorage - Add a new volume shadow copy storage association Create Shadow - Create a new volume shadow copy Delete Shadows - Delete volume shadow copies Delete ShadowStorage - Delete volume shadow copy storage associations List Providers - List registered volume shadow copy providers List Shadows - List existing volume shadow copies List ShadowStorage - List volume shadow copy storage associations List Volumes - List volumes eligible for shadow copies List Writers - List subscribed volume shadow copy writers Resize ShadowStorage - Resize a volume shadow copy storage association 68

C:\Resource Kit>volrest VOLREST 1.1 - Timewarp Previous Version command-line tool (C) Copyright 2003 Microsoft Corp. Resource Kit VolRest Usage: VOLREST [options] FileName Options are: /? - Displays this help. /A - Includes files with specified attributes. /AD Directories (only). /AS System files. /AH Hidden files. /B - Uses bare format (no heading information or summary). /S - Includes files in specified directory and all subdirectories. /R:<DirectoryName> - Restore all previous versions in target directory. /E - Restores empty directories (use with /R). /SCT - Decorates restored file names with the shadow copy timestamp. Use with /R. For example: "foo (Wednesday, January 01, 2003, 14.00.00).doc" Examples: VOLREST Z:\MYDIRECTORY\MYFILE.DOC VOLREST //server\share\mydirectory\*.doc VOLREST Z:\*.* /s /r:c:\oldfiles VOLREST Z:\*.DOC /s /r:c:\oldfiles /SCT 69

Session 1 Session 2 Session 64 Controller Controller Enable/Disable Session Control Events Recover Repair Windows Kernel Log files Buffers Correlate Provider A Provider B Events Provider C Real time delivery Consumer Consumer Logged Events Questions? Rich@Murphey.org http://murphey.org http://acsworldwide.com 70

For More Info C. R. Murphey, Automated Windows Event Log Forensics, Digital Investigation, August 2007 Digital Forensic Research Workshop, 8/13/07 GMU Forensics Symposium HTCIA National 8/27/07 71