26
1 Lecture 6 Lecture 6 Forensic Analysis of Windows Forensic Analysis of Windows Systems Systems (contd. after lecture 4) (contd. after lecture 4) Prof. Shamik Sengupta Office 4210N [email protected] http://jjcweb.jjay.cuny.edu/ssengupta/ Fall 2010

Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

  • Upload
    chad

  • View
    28

  • Download
    0

Embed Size (px)

DESCRIPTION

Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4). Prof. Shamik Sengupta Office 4210N [email protected] http://jjcweb.jjay.cuny.edu/ssengupta/ Fall 2010. What we will cover today. Forensic analysis of Windows systems Learning where to look - PowerPoint PPT Presentation

Citation preview

Page 1: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

1

Lecture 6Lecture 6

Forensic Analysis of Windows SystemsForensic Analysis of Windows Systems(contd. after lecture 4)(contd. after lecture 4)

Prof. Shamik Sengupta

Office 4210N

[email protected]

http://jjcweb.jjay.cuny.edu/ssengupta/

Fall 2010

Page 2: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

What we will cover today

Forensic analysis of Windows systems– Learning where to look

– Understanding compound file types– Viewing the structure

– Recover and Analyze

Hands-on Practice

2

Page 3: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

3

The Recycle Bin

Understanding how the recycle bin works is critically important for forensic examiners– Stores many significant info which is usually overlooked at the time

of examination

The recycle bin is a system folder of Windows– Operates in accordance with different rules than those govern

standard folders

– The folder is named as – “Recycled” in Windows 95/98

– “Recycler” in Windows NT/2000/XP

E.g., open a dos window and go to c drive– Type cd recycler

– It will open up the recycle bin folder

Page 4: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

4

The Recycle Bin (Continued)

E.g. recycler folder in XP

Page 5: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

5

The Recycle Bin (Continued)

When a file is deleted, it is moved to the Recycle Bin– On windows NT/2000/XP, the first time a user puts a file in the

recycle bin, a subfolder is created in c:\recycler– The subfolder is named with the user’s SID and contains its own INFO file,

making it possible to determine which user account was used to delete a file

When a file is deleted, it results in three steps:– 1) the deletion of the file’s folder entry in the folder in which the file

resided

– 2) the creation of a new folder entry for the file in the Recycle Bin

– 3) the addition of information about the file in a hidden system file named INFO (or INFO2 depending on windows systems) in the Recycle Bin

Page 6: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

6

The Recycle Bin (Continued)

E.g. recycler folder in XP

Page 7: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

7

The Recycle Bin (Continued)

So, although Windows does not store the deletion date and time of a file in its folder entry– Windows records the date and time of deletion in the INFO

file when a user sends a file to the Recycle Bin

Other information stored in the recycle bin include:– The file’s location prior to being sent to the Recycle Bin

– It’s index number in the Recycle Bin– It’s order in the Recycle Bin

– 0 assigned to the first file in the Recycle Bin after the Recycle Bin is emptied

– Its new filename in the Recycle Bin– Every file sent to the recycle bin is renamed in the following format

– D[orginal drive letter of file][index no][original extension]

– E.g. hw1.txt residing in C:\My Documents was sent to empty recycle bin

– Its new name is DC0.txt

Page 8: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

8

The Recycle Bin (Continued)

An INFO file is often effective in confirming or refuting computer user’s explanations regarding the presence or history of computer files recovered from their drives– It contains metadata relating to a particular file such as the

date of deletion and the original path

– INFO file records tell stories about file histories and the user’s state of mind

– Files deleted by the OS do not leave a record in the INFO file

– INFO file record indicates that a user knowingly deleted the file

If a user claims a file was downloaded without his notice during internet activity, the file’s location when it was deleted may tend to support or refute that contention– If a user deleted a particular file residing

– A) in a default download folder or in the Temporary Internet Files folder

– B) My Document\My Favorite Things\My Pictures…

Page 9: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

9

The Recycle Bin (Continued)

When the user elects to empty the Recycle Bin,– Windows deletes the file (such as DC0.txt) in the Recycle Bin

and also deletes the INFO file– More sophisticated techniques are then needed to recover the files

Page 10: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

10

The Recycle Bin in Windows Vista / 7

The contents of the recycle bin has changed in Windows Vista/7

The name of the folder itself has changed to “$Recycle.bin”– Open dos command prompt and go to c drive

– Type cd $Recycle.bin

The INFO2 file that is present in Windows 2000/XP/2003 has been removed

In Windows Vista, two files are created when a file is deleted into the recycle bin

– Both file have the same random looking name, but the names are preceded with a “$R” or “$I”

– The file with the “$R” at the beginning of the name is actually the data of the deleted file

– The file with the “$I” at the beginning of the name contains the path of where the file originally resided, as well as the date and time it was deleted

Page 11: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

11

Case study: Viewing Recycle Bin using EnCase

How do you view recycle bin using EnCase?– (you do not have to acquire the disk)

– Locate recycle bin using EnCase

– Locate the systems ids

– Locate the deleted files

Page 12: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

12

Shortcut Files

The shortcut files refer to shortcut links for quick viewing– Users open a file or folder or start an application program by

double clicking on the appropriate shortcut icon

Where are the shortcut files stored– Folder location of shortcut files

– Windows\Desktop

– Windows\Recent

– Windows\Start Menu

– Windows\Send to

The existence of shortcut files can serve to support the contention that a user had knowledge that a particular file or application was present on the computer– Although actual files might have been deleted

Page 13: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

13

Shortcut Files (Continued)

The Window\Recent menu folder contains shortcut files that point to data files that were opened on the computer– By default 12/15 shortcuts are maintained

– REALLY??

The Window\Start menu folder contains shortcut files that point to files and programs that appear on the Start Menu

– The shortcut files can provide evidence that an application program, which is no longer present on the computer, was installed at one time

– The date and time stamps on the shortcut files can help to identify the date that the installation occurred

Page 14: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

Viewing “desktop” and “recent” folder14

Page 15: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

15

Case Example: Shortcut Files

A special agent of the Illinois Attorney General’s Office investigated a case involving a CP.

The agent located a shortcut file in the Windows\Desktop folder whose target was a screensaver program.

Upon examining the screensaver program, the agent found that it caused 30 images depicting CP to be displayed on the computer’s monitor when the shortcut was activated.

This example is applicable to the investigation of many forms of computer crime

A special agent of the Illinois Attorney General’s Office investigated a case involving a CP.

The agent located a shortcut file in the Windows\Desktop folder whose target was a screensaver program.

Upon examining the screensaver program, the agent found that it caused 30 images depicting CP to be displayed on the computer’s monitor when the shortcut was activated.

This example is applicable to the investigation of many forms of computer crime

Page 16: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

16

Case study: Viewing Shortcut files using EnCase

How do you view shortcut files using EnCase?– (you do not have to acquire the disk)

– Locate shortcut files

– Analyze– The shortcut files also contain the fully qualified paths of the

files that they refer to

– (one of the greatest features for investigation)

– Also known as Symbolic link in EnCase

– Try locating this using EnCase Report

Page 17: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

17

THUMBS.DB

What is Thumbs.db?– Windows allow the user to set the properties of any folder to allow the

viewing of any graphics files in that folder as thumbnails

– System files “thumbs.DB” are created with info of these thumbnails– These system files also speed up the processing of graphics hence the

reason they were created in the Microsoft operating systems

“thumbs.DB” contains info of each graphics file in the folder – slightly altered headers

– A listing of files in the folder and their modification dates are also contained in thumbs.DB file

– Compound file

The artifacts can be significant since it is not perfectly synchronized with the actual contents of the folder– The user may delete files from the folder

– But thumbs.db can restore the files!!!

Page 18: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

18

Case Example: THUMBS.DB

Thumbs.DB file may show that files existed on the volume and it may further show the modification dates of those files even though the files did not exist at the time of the examination

In a recent federal criminal investigation, the examiner located a folder containing more than 400 evidentiary images.

When the examiner questioned the nature of the thumbs.db file, further analysis showed its function and contents.

The file was found to contain more than 900 images, many representing files of evidentiary value that had been deleted from the folder.

In a recent federal criminal investigation, the examiner located a folder containing more than 400 evidentiary images.

When the examiner questioned the nature of the thumbs.db file, further analysis showed its function and contents.

The file was found to contain more than 900 images, many representing files of evidentiary value that had been deleted from the folder.

Page 19: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

THUMBS.DB (contd.)

Windows stores the following formats as thumbnails: – JPEG, BMP, GIF, TIF, PDF and HTM

Each thumbnail created in a folder is represented in this thumbs.db database

Each folder with initiated thumbnail views will have thumbs.db file

19

Page 20: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

THUMBS.DB (contd.)

The early versions of thumbs.db files (in Windows ME and Windows 2000) contained– the filename

– the drive letter, and

– path to that image

Later versions, (in Windows XP and onward), store – its filename

– But NOT the drive letter and path

20

Page 21: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

21

THUMBS.DB in Vista and onward

The thumbnail cache that is used in Windows XP/2003, named THUMBS.DB has been replaced with a centralized thumbs database

Centralized thumbnail database is located in the following folder:– \Users\[User Account Name]\AppData\Local\Microsoft\Windows\Explorer

– Inside there are a few files with prefix thumbcache: thumbcache_xxxx.db

– You can no longer delete thumbs.db

dmThumbs (a tool for analyzing thumbs.db)– http://www.dmthumbs.com/

Page 22: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

Thumbs.db (case study)

Let’s do a simple hands-on practice.– We will view some pictures, will delete it afterwards and

then see if we can investigate and restore it using EnCase.

22

Page 23: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

Other compound files

EnCase Forensic can view the structure of the following types of compound files:– Thumbs.db files

– Zip files like .zip, .gzip, and .tar files

– Outlook Express (DBX)

– Outlook (PST)

– Exchange 2000/2003 (EDB)

– Lotus Notes (NSF) for versions 4, 5, and 6

– Mac DMG Format

– Mac PAX Format

– Korean Office Doc

23

Page 24: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

24

INDEX.DAT

Internet Explorer caches website that a user visits– When a user visit a site, IE first checks to see if the file is already cached

– If a cached file is found, IE uses cached file rather than downloading it

– IE stores cached files in the Temporary Internet Files folder– It also assigns each cached file an alphanumeric file name and maps the new file

names to the actual filenames in system files

Internet Explorer uses file – Earlier version: MM256.DAT (to store the reference of web pages whose

address were less than 257 characters) and MM2048.DAT (for pages whose address were between 257 and 2048 characters)

– Newer version: index.dat– Describe each file: URL, dates of modification by server and access by the user

Page 25: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

25

Case Example: index.dat

In another recent case, detectives investigated a woman’s complaint that she was the victim of stalking by a former boyfriend.

The woman claimed that the former boyfriend was sending threatening e-mail to her current boyfriend.

During investigation, she made another report alleging that she had been the victim of a home invasion during which she was assaulted, and she again identified the suspect as the same ex-boyfriend.

When the detectives examined the woman’s computer, they found that the temporary Internet cache files contained references to an America Online account.

Further examination of the Internet cache files and the records of America Online showed that the woman had set up an account with a screen name similar to that of the former boyfriend, and had sent the ‘threatening’ e-mail message herself.

In another recent case, detectives investigated a woman’s complaint that she was the victim of stalking by a former boyfriend.

The woman claimed that the former boyfriend was sending threatening e-mail to her current boyfriend.

During investigation, she made another report alleging that she had been the victim of a home invasion during which she was assaulted, and she again identified the suspect as the same ex-boyfriend.

When the detectives examined the woman’s computer, they found that the temporary Internet cache files contained references to an America Online account.

Further examination of the Internet cache files and the records of America Online showed that the woman had set up an account with a screen name similar to that of the former boyfriend, and had sent the ‘threatening’ e-mail message herself.

Page 26: Lecture 6 Forensic Analysis of Windows Systems (contd. after lecture 4)

Lab Practice

Download abc.zip from class website.– You are given this evidence file. We do not have any idea

what does this contain. Can you figure out using EnCase?

26