Here’s a compact summary of the third set of slides on Windows Forensics III:
- Windows Registry and Indexing:
- Post-Vista systems use file system virtualization for security, redirecting sensitive data to user-specific folders under User Access Control (UAC).
- Windows indexes common areas (e.g., Start Menu, C:\Users) and maintains these indexes in specific system folders, aiding forensic investigations by storing traces of encrypted or obfuscated files.
- NTUSER.DAT:
- Stores valuable forensic data, including Typed URLs (last 25 URLs typed in Internet Explorer) and programs run from the Start menu.
- User actions and timestamps can be extracted from the NTUSER.DAT registry file, making it a vital resource for examining user activity.
- Data Destruction and Defragmentation:
- Spoliation refers to intentional destruction or alteration of evidence. NTFS tracks file deletions by marking records as unallocated in $Bitmap and MFT.
- Even after wiping or destruction, forensic tools can often recover evidence or detect the use of data destruction tools (e.g., through filenames like DELETED_DELETED).
- Defragmentation gathers scattered data, which can overwrite unallocated space, affecting forensic recovery. Forensic tools can detect defragmentation traces.
- File Deletion:
- Deleting files doesn’t always mean they’re irretrievable. INFO2/$I files help recover details such as the file path, deletion time, and associated user account.
- Files bypassing the Recycle Bin can often still be recovered via file carving, and forensic tools can examine SIA (Standard Information Attribute) for additional insights.
- Internet and Communication Artefacts:
- Internet Explorer: Forensic traces from web activities are stored in cookies, web cache, and index.dat files, recording URLs, timestamps, and browsing history.
- Web browsing artefacts for Chrome, Firefox, and Microsoft Edge are similarly accessible in various AppData folders.
- Communication artefacts from email (e.g., Windows Live Mail) and instant messaging (e.g., Skype, IRC) can also provide rich forensic information.
- Windows 10 Forensics:
- Cortana creates forensic artefacts like WiFi access points, geolocation data, and contact lists in files such as CortanaCoreDB.dat and IndexedDB.edb.
- Registry, event logs, and prefetch data still retain similar forensic value as in earlier Windows versions, while shadow copies and AppContainer storage continue to provide key system snapshots.
- Memory Forensics:
- Windows Process Memory (RAM) contains vital information such as running services, decrypted passwords, cryptographic keys, and active network connections. This data is crucial for in-depth forensic analysis of a system’s current state.
These slides expand on Windows forensics, emphasizing user activities, file deletion, data destruction, and critical artefacts from web usage and system memory