Unit 3 - WINDOWS FORENSIC
Unit 3 - WINDOWS FORENSIC
Forensic Analysis
1
General architecture of Operating system
2
Windows OS Architecture
3
Linux OS Architecture
4
The following is a high-level overview of the main layers of the Linux
architecture:
• Hardware layer: This is the bottommost layer of the Linux architecture and
represents the physical hardware components of the computer, such as the
processor, memory, and storage. The hardware layer is responsible for
interacting with the various hardware devices and providing access to them
for the rest of the operating system.
• Kernel layer: The kernel is the core of the operating system and is responsible
for managing the resources of the computer, such as the CPU, memory, and
I/O devices. It also provides services to the other components of the
operating system and acts as the intermediary between the hardware and the
software layers.
• System libraries layer: This layer consists of a set of libraries that provide
functions for the applications to use. These libraries include system calls,
which are used to invoke kernel functions, as well as other functions that
perform tasks such as file manipulation, networking, and memory
management.
5
• System utilities layer: This layer consists of a set of programs that perform
various system-level tasks, such as managing processes, controlling user
accounts, and configuring system settings. These utilities are usually
command-line programs that are invoked by the user or by other
programs.
• Desktop environment layer: This layer is optional and is not present on all
Linux systems. It provides a graphical user interface (GUI) that allows users
to interact with the operating system using a mouse and keyboard. The
most common desktop environments in Linux are Gnome, KDE, and Xfce.
• Applications layer: This is the topmost layer of the Linux architecture and
consists of the various applications that run on the operating system. These
can be anything from productivity software and games to web browsers
and media players.
In summary, the Linux architecture is made up of a number of different
layers that work together to provide a stable and flexible operating system.
Each layer has a specific purpose and interacts with the other layers to
provide the functionality that users expect from an operating system.
6
Macintosh or Mac OS Architecture
macOS Ventura-2023
macOS 14 Sonoma
https://www.apple.com/macos/ventura/
7
File system analysis
Refer: Experiment-2 9
Analyzing Unallocated Partitions Refer : Experiment -9,11
Analyzing unallocated partitions can be done by using the Disk Management tool in
Windows. Here are the steps:
• Press Windows key + X and select Disk Management.
• Right-click on the unallocated partition and select New Simple Volume.
• Follow the wizard to create a new partition.
• If you want to recover an unallocated partition, you can use the DiskPart command-line
tool. Here are the steps:
• Search for “CMD” in the start bar and right-click to “Run as Administrator”.
• After entering “diskpart”, type the following commands in sequence:
• list volume and press Enter.
• select volume X (where X is the number of the unallocated partition) and press Enter.
• extend filesystem and press Enter.
• After saving and exiting, check whether the unallocated partition is recovered.
10
Understanding Windows Registry
• The Windows Registry is a hierarchical database that stores low-level settings for the
Microsoft Windows operating system and for applications that opt to use the registry.
• It contains information, settings, options, and other values for programs and hardware
installed on all versions of Microsoft Windows operating systems.
• You can open the Registry Editor in Windows 10 by typing “regedit” in the search box on
the taskbar and selecting the top result for Registry Editor (Desktop app) or by pressing
and holding or right-clicking the Start button, then selecting Run. Enter “regedit” in the
Open: box and select OK
Refer: Experiment-2
11
Registry Analysis: Understanding Windows Registry
There are many registry analysis tools available online that can help
you analyze the Windows Registry. Some of them are free, while
others are paid. Here are some popular ones:
• RegScanner
• RegShot
• RegFromApp
• Process Monitor
12
What are important artefacts related to user activities?
In the context of user activities, artifacts are the digital footprints that users
leave behind while interacting with a system. These artifacts can be used to
reconstruct user activities and provide insights into user behavior.
• Cookies
• Registry keys
Analyzing these artifacts can help you understand how users interact with
your system and identify areas for improvement
13
User/Application Configurations and Preferences
• User/Application configurations
and preferences are settings that
users can customize to suit their
needs and preferences. These
settings can include things like
font size, colour scheme,
language preference, and more.
Refer: Experiment-11
16
Here are the steps to share a folder on a Windows
computer:
17
Here are the steps to share a drive on a
Windows computer:
18
Recently Accessed Documents, Programs and Locations
Refer: Experiment-9
19
Installed Applications and Others from Windows Registry
Refer: Experiment-2,3
20
Event and Log Analysis: Introduction to Windows Events
Refer: Experiment-2
21
Understanding Windows Events (Evt and Evtx Files)
• Windows events are stored in files with the extension “.evt” or “.evtx”. These files can be viewed using the
Event Viewer.
• The “.evt” file format is used in older versions of Windows, while the “.evtx” file format is used in newer
versions of Windows.
Refer: experiment -4
Ref -https://observiq.com/ 22
Analyzing Logs of Third-Party Applications
23
Log analysis at Microsoft Azure
24