Lecture 6 APIC 1.2.3
Lecture 6 APIC 1.2.3
Forensics Investigation of
Windows system
ICT3052
APIC’s Copyright Warning Notice
WARNING
This material has been reproduced and communicated to you by or on behalf of Asia Pacific
International College in accordance with section 113P of the Copyright Act 1968 (Act).
The material in this communication may be subject to copyright under the Act. Any further
reproduction or communication of this material by you may be the subject of copyright
protection under the Act.
Do not remove this notice.
Objectives
• Explain the purpose and structure of file systems
• Describe Microsoft file structures
• Explain the NTFS disk structure
• List some options for decrypting drives encrypted with whole disk encryption
• Explain the working of Windows Registry
• Describe Microsoft startup tasks
• Explain the purpose of a virtual machine
Understanding File Systems
File system Type of file system an OS uses determines When you need to access a suspect’s
how data is stored on the disk computer to acquire or inspect data
Gives OS a road map to data on a disk You should be familiar with both the computer’s OS
and file systems
4
Understanding the Boot
Sequence
• Complementary Metal Oxide Semiconductor (CMOS)
• Computer stores system configuration and date and time information in the CMOS
• When power to the system is off
• Basic Input/Output System (BIOS) or Extensible Firmware Interface (EFI)
• Contains programs that perform input and output at the hardware level
• Bootstrap process
• Contained in ROM, tells the computer how to proceed
• Displays the key or keys you press to open the CMOS setup screen
• CMOS should be modified to boot from a forensic floppy disk or CD
Understanding the Boot Sequence
Understanding Disk Drives
• Disk drives are made up of one or more platters coated with magnetic material
• Disk drive components
• Geometry
• Head
• Tracks
• Cylinders
• Sectors
• Properties handled at the drive’s hardware or firmware level
• Zone bit recording (ZBR)
• Track density
• Areal density
• Head and cylinder skew
Solid-state Storage Devices
All flash memory devices have a feature called wear-leveling
• An internal firmware feature used in solid-state drives that
ensures even wear of read/writes for all memory cells
• A file system associates names with data files, stores file attributes such as
modify, access, creation, metadata and others
• Type of file system an OS uses decides how data is stored on the disk
• You should be familiar with the operating systems and file system when accessing the
suspect’s computer to acquire or inspect data.
The Purpose and Roles of File Systems
(Digital Forensics Perspective)
As a digital forensics' investigator, you may be interested in the following file / file system
attributes
36
NTFS Compressed Files
• NTFS provides compression like FAT DriveSpace 3 (a Windows
98 compression utility)
• With NTFS, files, folders, or entire volumes can be
compressed
• Most computer forensics tools can uncompress and analyze
compressed Windows data
NTFS Encrypting File System
(EFS)
• Encrypting File System (EFS)
• Introduced with Windows 2000
• Implements a public key and private key method of encrypting files, folders, or
disk volumes
• When EFS is used in Windows 2000 and later
• A recovery certificate is generated and sent to the local Windows administrator
account
• Users can apply EFS to files stored on their local workstations or a remote server
EFS Recovery Key Agent
Recovery Key Agent implements the recovery certificate
• Which is in the Windows administrator account
Windows administrators can recover a key in two ways: through
Windows or from a command prompt
Commands:
• cipher
• copy
Deleting NTFS Files
When a file is deleted in Windows NT and later, the operating
system renames the file and places it in recycle bin.
Can use the del (delete) MS-DOS command
• Eliminates the file from the MFT listing in the same way
FAT does
Resilient File System
• Resilient File System (ReFS) - designed to address very large data storage
needs
• Such as the cloud
• Features incorporated into ReFS’s design:
• Maximized data availability
• Improved data integrity
• Designed for scalability
• ReFS uses disk structures similar to the MFT in NTFS
Understanding Whole Disk Encryption
In recent years, there has been more concern about loss of
• Personal identity information (PII) and trade secrets caused by computer
theft
Of particular concern is the theft of laptop computers and handheld devices
To help prevent loss of information, software vendors now provide whole disk
encryption
Current whole disk encryption tools offer the following features:
• Preboot authentication
• Full or partial disk encryption with secure hibernation
• Advanced encryption algorithms
• Key management function
Understanding Whole Disk
Encryption
• Whole disk encryption tools encrypt each sector of a drive separately
• Many of these tools encrypt the drive’s boot sector
• To prevent any efforts to bypass the secured drive’s partition
• To examine an encrypted drive, decrypt it first
• Run a vendor-specific program to decrypt the drive
• Many vendors use a bootable CD or USB drive that prompts for a
one-time passphrase
Examining Microsoft BitLocker
Available Vista Enterprise/Ultimate, Windows 7, 8, and 10 Professional/Enterprise, and
Server 2008 and later
Hardware and software requirements
• A computer capable of running Windows Vista or later
• The TPM microchip, version 1.2 or newer
• A computer BIOS compliant with Trusted Computing Group (TCG)
• Two NTFS partitions
• The BIOS configured so that the hard drive boots first before checking other
bootable peripherals
Examining Third-Party Disk
Encryption Tools
Some available third-party WDE utilities:
• Endpoint Encryption
• Voltage SecureFile
• Jetico BestCrypt Volume Encryption
Understanding the Windows
Registry
Registry
• A database that stores hardware and software configuration
information, network connections, user preferences, and setup
information
To view the Registry, you can use:
• Regedit (Registry Editor) program for Windows 9x systems
• Regedt32 for Windows 2000, XP, and Vista
• Both utilities can be used for Windows 7 and 8
Registry terminology:
Exploring the • Registry
Registry • Value
• Default value
• Hives
Exploring the Organization of the Windows
Registry
Exploring the Organization of the Windows
Registry
Examining the Windows Registry
Tools with built-in or add-on Registry
viewers:
• X-Ways Forensics
• OSForensics
• Forensic Explorer
• FTK
• Nelson, B., Phillips, A., & Steuart,
C. (2019). Guide to Computer
Forensics and Investigations
(6/e). Boston, MA. Course
Technology
References • Brooks, C. L. (2014). CHFI
Computer Hacking Forensic
Investigator Certification All-in-
One Exam Guide. McGraw-
Hill Publisher.