Digital Forensics: Working With Windows and DOS Systems
Digital Forensics: Working With Windows and DOS Systems
Lecture 6
Working with Windows and DOS Systems
Objectives
• Identify a number of different storage devices
• Explain the purpose and structure of file systems
• Describe Microsoft file structures
• Explain the structure of New Technology File
System (NTFS) disks
• List some options for decrypting drives encrypted
with whole disk encryption
• Explain how the Windows Registry works
• Describe Microsoft startup tasks and boot process
Categorising Storage Devices
• The purpose of the storage unit of the computer is to store
the data entered before processing and also to store the
results after processing.
• Data area – the portion of the disk that actually holds data
RAID - Redundant Array of Inexpensive Disks
• Disk organization techniques that manage a large numbers
of disks, providing a view of a single disk
• Disk cartridges are like small removable hard disks, and can
store up to 2 GB.
• When an optical drive shines light into a pit, the light cannot
be reflected back. This represents a bit value of 0 (off). A
land reflects light back to its source, representing a bit value
of 1 (on).
CD Writing Technologies
• In PCs, the most commonly used optical storage technology is
called Compact Disk Read-Only Memory (CD-ROM).
• Registry
– A database that stores hardware and software
configuration information, network connections, user
preferences, and setup information
• For investigative purposes, the Registry can
contain valuable evidence
• To view the Registry, you can use:
– Regedit (Registry Editor) program for Windows 9x
systems
– Regedt32 for Windows 2000 and XP
Understanding Microsoft Startup Tasks
• Learn what files are accessed when Windows
starts
• This information helps you determine when a
suspect’s computer was last accessed
– Important with computers that might have been used
after an incident was reported
Startup in Windows NT and Later
• All NTFS computers perform the following steps
when the computer is turned on:
– Power-on self test (POST)
– Initial startup
– Boot loader
– Hardware detection and configuration
– Kernel loading
– User logon
Startup in Windows NT and Later
(continued)
• Contamination Concerns with Windows XP
– When you start a Windows XP NTFS workstation,
several files are accessed immediately
• The last access date and time stamp for the files
change to the current date and time
– Destroys any potential evidence
• That shows when a Windows XP workstation was last
used
Thank You!