1 / 24

Chapter 9: Registry Evidence

Chapter 9: Registry Evidence. Mastering Windows Network Forensics and Investigation. Evidence in Software Key:. HKLMSOFTWARE % SystemRoot %system32 config software Installed software Other locations for installed software HKLMSOFTWAREMicrosoftWindows CurrentVersion App Paths

vida
Download Presentation

Chapter 9: Registry Evidence

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 9: Registry Evidence Mastering Windows Network Forensics and Investigation

  2. Evidence in Software Key: • HKLM\SOFTWARE • %SystemRoot%\system32\config\software • Installed software • Other locations for installed software • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall

  3. Evidence in Software Key: • Last Logon • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon • Banners • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon

  4. Action Center & Firewall Settings: • Action Center • Advises user if firewall off, anti-virus not installed or out of date, or if updates not turned on or out of date • Settings stored in: • HKLM\SOFTWARE\Microsoft\Security Center OR • HKCU\SOFTWARE\Microsoft\ Windows\CurrentVersion\ActionCenter

  5. Windows XP Security Center Settings:

  6. Windows 7 Action Center Settings:

  7. Security Center & Firewall Settings: • Windows Firewall • Released with XP Service Pack 2 • Firewall is on by default • Powerful logging utility, but is off by default in Windows XP • Settings stored in registry • HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy

  8. Firewall Settings: • Settings stored in registry • Subkey “DomainProfile” for domain • Subkey “StandardProfile” for local machine • Subkeys under each of the above: • “AuthorizedApplications “ • “GloballyOpenPorts” • Subkey under each of the above: • “List” – lists settings in plain text

  9. Restore Point Registry Hive Files: • Restore points started with XP / ME • Snapshot of system files taken every 24 hrs or when software installed, update installed, or when unsigned driver installed – User can create! • Stored for up to 90 days if disk space available

  10. Restore Point Registry Hive Files: • Settings stored in registry at: • HKLM\Software\Microsoft\WindowsNT\CurrentVersion\SystemRestore • Restore points stored in • C:\System Volume Information\restore{GUID}\RP## • ## is sequentially numbered restore points

  11. Restore Point Registry Hive Files: • Registry hive files stored under snapshot folder and are renamed

  12. Volume Shadow Copy Service • Greater number of file types are tracked in VSC – Entire Volume! • Every file that changed since the last snapshot is included in VSC restore point • Still located in System Volume Information folder but with different name

  13. Volume Shadow Copy Service • Registry key tracking the monitored volumes: HKLM\Software\Microsoft\WindowsNT\CurrentVersion\SPP\Clients\{09F7EDC5-294E-4180-AF6A-FB0E6A0E9513} • Access VSC by using vssadmin command and creating symbolic link • The conduct analysis as if the data was it’s own logical volume

  14. Security Identifiers: • SID is a security identifier • SID is a unique identifier in that no two SIDs • Windows grants or denies access and privileges to system objects based on access control lists (ACLs), which in turn use the SID as a means of identifying users, groups, and machines, since each has its own unique SID

  15. Security Identifiers: • SID’s to User mapping is stored in SAM for a local logon • In a domain, SID to User resolution is stored in Active Directory on Domain Controller • Backdoor to resolving SID to User in a domain setting at key: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList

  16. User Activities: • NTUSER.DAT contains user specific settings about installed software • For pre-IE7, Protected Storage System Provider contains encrypted values for MSIE “Autocomplete” and stored user names and passwords • For post-IE7 autocomplete information is stored in IntelliForms • HKCU\Software\Microsoft\Internet Explorer\IntelliForms\

  17. User Activities: • MRU’s “most recently used” • RunMRU • MRUList • HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs • HKCU\Software\Microsoft\Internet Explorer\TypedURLs

  18. User Activities: • UserAssist key • HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist • Value names under “Count” stored in ROT13 • 2nd dWord value is count starting at 5 (Windows XP, Vista, 2003, 2008) or 1 (Windows 7) • Last eight bytes 64 bit Windows timestamp indicating last time user launched

  19. LSA Secrets: • LSA stands for Local Security Authority • SECURITY\Policy\Secrets • Contains security information regarding various service accounts and other accounts necessary for Windows and is stored by the service control manager • Tools to extract: • Lsadump2.exe • Cain

  20. IP Addresses: • Stored in registry • HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces • Subkeys are interfaces and appear with GUID names • Static vs Dynamic addresses

  21. Time Zone Offsets: • NTFS stores timestamps in GMT • Windows displays time to user based on local host time zone offset. • Time zone offset stored in registry • HKLM\SYSTEM\CurrentControlSet\Control\TimeZoneInformation

  22. Startup Locations: • Many locations within Windows where programs or code runs with Windows boot, user logon, etc • Registry alone contains dozens of locations and methods • Windows configuration files can also be used to run code • List of these locations is extensive

  23. Startup Locations: • If you know what the bad code is and its file name it’s easier to search registry and Windows configuration files for file name • When unknown, use tools such as • EnCase Scan Registry Enscript • Autoruns by Sysinternals

  24. Where are auditing settings stored? • In most cases you won’t be able to open the LSS applet to determine auditing level on live system • Stored in registry: HKLM\SECURITY\Policy\PolAdtEv

More Related