SlideShare a Scribd company logo
UNIT 2: WINDOWS FORENSICS
DON CAEIRO
UNDERSTANDING FILE
SYSTEMS
UNDERSTANDING FILE SYSTEMS
• File system
• Gives OS a road map to data on a disk
• Type of file system an OS uses determines how data is
stored on the disk
• A file system is usually directly related to an OS
• When you need to access a suspect’s computer to acquire
or inspect data
• You should be familiar with the computer’s platform
UNDERSTANDING DISK DRIVES
• Disk drives are made up of one or more platters coated
with magnetic material
• Disk drive components
• Geometry
• Head
• Tracks
• Cylinders
• Sectors
• Holds 512 bytes, you cannot read or write anything less than a sector
Windows Forensics- Introduction and Analysis
Windows Forensics- Introduction and Analysis
UNDERSTANDING DISK DRIVES (CONTINUED)
• Properties handled at the drive’s hardware or firmware
level
• Zoned bit recording (ZBR)
• Track density
• Areal density
• Head and cylinder skew
EXPLORING MICROSOFT
FILE STRUCTURES
EXPLORING MICROSOFT FILE STRUCTURES
• In Microsoft file structures, sectors are grouped to form
clusters
• Storage allocation units of one or more sectors
• Clusters are typically 512, 1024, 2048, 4096, or more bytes
each
• Combining sectors minimizes the overhead of writing or
reading files to a disk
EXPLORING MICROSOFT FILE STRUCTURES
(CONTINUED)
• Clusters are numbered sequentially starting at 2
• First sector of all disks contains a system area, the
boot record, and a file structure database
• OS assigns these cluster numbers, called logical
addresses
• Sector numbers are called physical addresses
• Clusters and their addresses are specific to a
logical disk drive, which is a disk partition
DISK PARTITIONS
• A partition is a logical drive
• FAT16 does not recognize disks larger than 2 GB
• Large disks have to be partitioned
• Hidden partitions or voids
• Large unused gaps between partitions on a disk
• Partition gap
• Unused space between partitions
DISK PARTITIONS (CONTINUED)
• Disk editor utility can alter information in partition table
• To hide a partition
• Can examine a partition’s physical level with a disk editor:
• HxD, Norton DiskEdit, WinHex, or Hex Workshop
• Analyze the key hexadecimal codes the OS uses to identify
and maintain the file system
MASTER BOOT RECORD STRUCTURE
PARTITION TABLE STRUCTURE
• From Wikipedia
• Link Ch 6a
Windows Forensics- Introduction and Analysis
PARTITION MARK AT START OF VOLUME
• Start HxD, Extras, Open Disk
• NTFS
• FAT32
BMP FILE IN HXD
• Start HxD, File, Open
• BM at start indicates a BMP file
WORD DOC FILE IN HXD
• Start HxD, File, Open
• Word 2003 Format uses these 7 bytes
• .docx format is actually a Zip archive
MASTER BOOT RECORD
• On Windows and DOS computer systems
• Boot disk contains a file called the Master Boot Record (MBR)
• MBR stores information about partitions on a disk and
their locations, size, and other important items
• Several software products can modify the MBR, such as
PartitionMagic’s Boot Magic
EXAMINING FAT DISKS
• File Allocation Table (FAT)
• File structure database that Microsoft originally
designed for floppy disks
• Used before Windows NT and 2000
• FAT database is typically written to a disk’s
outermost track and contains:
• Filenames, directory names, date and time stamps,
the starting cluster number, and file attributes
• FAT versions
FAT VERSIONS
• FAT12—for floppy disks, max size 16 MB
• FAT16—allows hard disk sizes up to 2 GB
• FAT32— allows hard disk sizes up to 2 TB •
EXAMINING FAT DISKS (CONTINUED)
• Cluster sizes vary according to the hard disk size and file
system
• This table is for FAT-16
EXAMINING FAT DISKS (CONTINUED)
• When you run out of room for an allocated cluster
• OS allocates another cluster for your file, which creates more
slack space on the disk
• As files grow and require more disk space, assigned
clusters are chained together
• The chain can be broken or fragmented
PRODISCOVER SHOWING CLUSTER CHAIN
EXAMINING FAT DISKS (CONTINUED)
• When the OS stores data in a FAT file system, it
assigns a starting cluster position to a file
• Data for the file is written to the first sector of the
first assigned cluster
• When this first assigned cluster is filled and runs
out of room
• FAT assigns the next available cluster to the file
• If the next available cluster isn’t contiguous to
the current cluster
DELETING FAT FILES
• In Microsoft OSs, when a file is deleted
• Directory entry is marked as a deleted file
• With the HEX E5 (σ) character replacing the first letter of the
filename
• FAT chain for that file is set to 0
• Data in the file remains on the disk drive
• Area of the disk where the deleted file resides
becomes unallocated disk space
• Available to receive new data from newly created files
or other files needing more space
EXAMINING NTFS DISKS
• New Technology File System (NTFS)
• Introduced with Windows NT
• Recommended file system for Windows 200 Pro, XP, and later
versions through Windows 7 at least
• Improvements over FAT file systems
• NTFS provides more information about a file
• NTFS gives more control over files and folders
• NTFS was Microsoft’s move toward a journaling file system
EXAMINING NTFS DISKS (CONTINUED)
• In NTFS, everything written to the disk is
considered a file
• On an NTFS disk
• First data set is the Partition Boot Sector
• Next is Master File Table (MFT)
• NTFS results in much less file slack space
• Clusters are smaller for smaller disk drives
• NTFS also uses Unicode
• An international data format
EXAMINING NTFS DISKS (CONTINUED)
NTFS FILE SYSTEM
• MFT contains information about all files on the disk
• Including the system files the OS uses
• In the MFT, the first 15 records are reserved for system
files
• Records in the MFT are called metadata
NTFS FILE SYSTEM (CONTINUED)
NTFS FILE SYSTEM (CONTINUED)
MFT AND FILE ATTRIBUTES
• In the NTFS MFT
• All files and folders are stored in separate records of
1024 bytes each
• Each record contains file or folder information
• This information is divided into record fields
containing metadata
• A record field is referred to as an attribute ID
• File or folder information is typically stored in
one of two ways in an MFT record:
RESIDENT FILE IN A MFT RECORD
MFT AND FILE ATTRIBUTES (CONTINUED)
• When a disk is created as an NTFS file structure
• OS assigns logical clusters to the entire disk partition
• These assigned clusters are called logical cluster
numbers (LCNs)
• Become the addresses that allow the MFT to link to nonresident
files on the disk’s partition
NTFS COMPRESSED FILES
• NTFS provides compression similar to FAT DriveSpace 3
• Under NTFS, files, folders, or entire volumes can be
compressed
• Most computer forensics tools can uncompress and
analyze compressed Windows data
NTFS ENCRYPTING FILE SYSTEM (EFS)
• Encrypting File System (EFS)
• Introduced with Windows 2000
• Implements a public key and private key method of
encrypting files, folders, or disk volumes
• When EFS is used in Windows 2000
• A recovery certificate is generated and sent to the
local Windows administrator account
• Users can apply EFS to files stored on their local
workstations or a remote server
DELETING NTFS FILES
• When a file is deleted in Windows XP, 2000, or NT
• The OS renames it and moves it to the Recycle Bin
• Can use the Del (delete) MS-DOS command
• Eliminates the file from the MFT listing in the same way FAT does
UNDERSTANDING THE
WINDOWS REGISTRY
UNDERSTANDING THE WINDOWS REGISTRY
• Registry
• A database that stores hardware and software configuration
information, network connections, user preferences, and setup
information
• For investigative purposes, the Registry can contain valuable
evidence
• To view the Registry, you can use:
• Regedit (Registry Editor) program for Windows 9x systems
• Regedt32 for Windows 2000 and XP
EXPLORING THE ORGANIZATION OF THE
WINDOWS REGISTRY (CONTINUED)
EXPLORING THE ORGANIZATION OF THE
WINDOWS REGISTRY (CONTINUED)
UNDERSTANDING
MICROSOFT STARTUP
TASKS
UNDERSTANDING MICROSOFT STARTUP TASKS
• Learn what files are accessed when Windows starts
• This information helps you determine when a suspect’s
computer was last accessed
• Important with computers that might have been used after an
incident was reported
STARTUP IN WINDOWS NT AND LATER
• All Windows NT computers perform the following steps
when the computer is turned on:
• Power-on self test (POST)
• Initial startup
• Boot loader
• Hardware detection and configuration
• Kernel loading
• User logon
STARTUP PROCESS FOR WINDOWS VISTA
• Uses the new Extensible Firmware Interface ( EFI)
as well as the older BIOS sys-tem.
• NT Loader (NTLDR) has been replaced by three
boot utilities
• Bootmgr.exe—displays list of operating systems
• Winload.exe—loads kernel, HAL, and drivers
• Winresume.exe—restarts Vista after hibernation
• See link Ch 6g
STARTUP FILES FOR WINDOWS XP
• NT Loader (NTLDR)
• Boot.ini
• BootSect.dos
• NTDetect.com
• NTBootdd.sys
• Ntoskrnl.exe
• Hal.dll
• Pagefile.sys
• Device drivers
STARTUP IN WINDOWS NT AND LATER
(CONTINUED)
• Windows XP System Files
STARTUP IN WINDOWS NT AND LATER
(CONTINUED)
• Contamination Concerns with Windows XP
• When you start a Windows XP NTFS workstation, several files are
accessed immediately
• The last access date and time stamp for the files change to the current
date and time
• Destroys any potential evidence
• That shows when a Windows XP workstation was last used
STARTUP IN WINDOWS 9X/ME
• System files in Windows 9x/Me containing valuable
information can be altered easily during startup
• Windows 9x and Windows Me have similar boot processes
• With Windows Me you can’t boot to a true MS-DOS mode
• Windows 9x OSs have two modes:
• DOS protected-mode interface (DPMI)
• Protected-mode GUI
STARTUP IN WINDOWS 9X/ME (CONTINUED)
• The system files used by Windows 9x have their origin in
MS-DOS 6.22
• Io.sys communicates between a computer’s BIOS, the hardware,
and the OS kernel
• If F8 is pressed during startup, Io.sys loads the Windows Startup menu
• Msdos.sys is a hidden text file containing startup options for
Windows 9x
• Command.com provides a command prompt when booting to
MS-DOS mode (DPMI)
UNDERSTANDING MS-
DOS STARTUP TASKS
UNDERSTANDING MS-DOS STARTUP TASKS
• Two files are used to configure MS-DOS at startup:
• Config.sys
• A text file containing commands that typically run only at system startup
to enhance the computer’s DOS configuration
• Autoexec.bat
• A batch file containing customized settings for MS-DOS that runs
automatically
• Io.sys is the first file loaded after the ROM bootstrap
loader finds the disk drive
UNDERSTANDING MS-DOS STARTUP TASKS
(CONTINUED)
• Msdos.sys is the second program to load into RAM
immediately after Io.sys
• It looks for the Config.sys file to configure device drivers and
other settings
• Msdos.sys then loads Command.com
• As the loading of Command.com nears completion,
Msdos.sys looks for and loads Autoexec.bat
OTHER DISK OPERATING SYSTEMS
• Control Program for Microprocessors (CP/M)
• First nonspecific microcomputer OS
• Created by Digital Research in 1970
• 8-inch floppy drives; no support for hard drives
• Digital Research Disk Operating System (DR-DOS)
• Developed in 1988 to compete with MS-DOS
• Used FAT12 and FAT16 and had a richer command environment
SRUM
SYSTEM RESOURCE USER MANAGEMENT (SRUM)
• User management is about interfacing humans to
computers. This brings to light a number of
issues:Accounting: Registering new users and deleting old
ones.Comfort and convenience.Support services.Ethical
issues.Trust management and security.
SYSTEM ADMINISTRATION DUTIES
Analyse system logs and identify potential issues that need
attention.
Introduce and integrate new technologies.
Performing backups.
Updating OSs and applying patches and configuration changes.
Installing and configuring new hardware and software.
Configure, monitor and maintain: – Email applications – Virus
protection software – Etc
• forensic analysis of a data set that spans multiple drives.

More Related Content

PDF
Cryptography and Network Lecture Notes
PPTX
Windows File Systems
PPT
Secure shell ppt
PPT
data hiding techniques.ppt
PPTX
Kerberos : An Authentication Application
PPTX
Linux User Management
PPTX
User management
PPTX
Kerberos
Cryptography and Network Lecture Notes
Windows File Systems
Secure shell ppt
data hiding techniques.ppt
Kerberos : An Authentication Application
Linux User Management
User management
Kerberos

What's hot (20)

PPT
Message authentication and hash function
PPT
Registry Forensics
PDF
CNS - Unit - 1 - Introduction
PPT
Windows V/S Linux OS - Comparison
PPT
Monoalphabetic Substitution Cipher
PPTX
Linux operating system - Overview
PDF
Understanding Keylogger
PPTX
public key infrastructure
PPTX
Filepermissions in linux
PPTX
Key management
PDF
Operating systems system structures
PPT
Keyloggers.ppt
PPT
Chapter 3 - Processes
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PDF
Course 102: Lecture 14: Users and Permissions
PPTX
Cryptography
DOCX
It8073 information security syllabus
PDF
Hardening automation with Kubespray by Alessio Greggi
PPT
2. microkernel new
PPT
Firewall Architecture
Message authentication and hash function
Registry Forensics
CNS - Unit - 1 - Introduction
Windows V/S Linux OS - Comparison
Monoalphabetic Substitution Cipher
Linux operating system - Overview
Understanding Keylogger
public key infrastructure
Filepermissions in linux
Key management
Operating systems system structures
Keyloggers.ppt
Chapter 3 - Processes
Cryptography and Network Security William Stallings Lawrie Brown
Course 102: Lecture 14: Users and Permissions
Cryptography
It8073 information security syllabus
Hardening automation with Kubespray by Alessio Greggi
2. microkernel new
Firewall Architecture
Ad

Similar to Windows Forensics- Introduction and Analysis (20)

PPT
CF_Unit5_WorkingWithWindowsAndDOS23052021.ppt
PPTX
Windows File Systems
PPT
Working with Windows and DOS Systems (1).ppt
PDF
Course 102: Lecture 26: FileSystems in Linux (Part 1)
PPT
Windowsforensics
PPTX
file system overview in oerating system .
PDF
Computer Forensics Working with Windows and DOS Systems
PPTX
Windows file system
PPTX
Working of Volatile and Non-Volatile memory
PPTX
Managing Files
PPTX
Digital Information Forensics Lecture on the topic of Partion Table
PDF
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
PPT
Cos413day3
PPT
File system
PPTX
6-File Systems logically for storage and retrieval..pptx
PPTX
Disk and File System Management in Linux
PDF
Course 102: Lecture 27: FileSystems in Linux (Part 2)
PPTX
File system and Deadlocks
CF_Unit5_WorkingWithWindowsAndDOS23052021.ppt
Windows File Systems
Working with Windows and DOS Systems (1).ppt
Course 102: Lecture 26: FileSystems in Linux (Part 1)
Windowsforensics
file system overview in oerating system .
Computer Forensics Working with Windows and DOS Systems
Windows file system
Working of Volatile and Non-Volatile memory
Managing Files
Digital Information Forensics Lecture on the topic of Partion Table
CNIT 121: 12 Investigating Windows Systems (Part 1 of 3)
Cos413day3
File system
6-File Systems logically for storage and retrieval..pptx
Disk and File System Management in Linux
Course 102: Lecture 27: FileSystems in Linux (Part 2)
File system and Deadlocks
Ad

More from Don Caeiro (20)

PPTX
Investigation and Analysis of Digital Evidence
PPTX
Network Forensics- Social Media Forensics
PPTX
Mobile Forensics and Investigation Android Forensics
PPTX
Introduction to Incident Response Management
PPTX
Crime Scene Photography
PPTX
Recording of Fingeprints
PPTX
Legal Aspects of Questioned Documents
PPTX
Criminal Justice System.pptx
PPTX
Forensic Medicine
PPTX
Securing the Crime Scene
PPTX
Types of Crime Scenes
PPTX
Biometrics
PPTX
Introduction to Digital Forensics
PPTX
Forensic engineering
PPTX
Forensic archaeology
PPTX
Currency notes and passports security features
PPTX
Questioned documents Full PPT
PDF
Footprint case study
PPTX
Criminalistics Unit 3
PPTX
Unit 2 crime and society
Investigation and Analysis of Digital Evidence
Network Forensics- Social Media Forensics
Mobile Forensics and Investigation Android Forensics
Introduction to Incident Response Management
Crime Scene Photography
Recording of Fingeprints
Legal Aspects of Questioned Documents
Criminal Justice System.pptx
Forensic Medicine
Securing the Crime Scene
Types of Crime Scenes
Biometrics
Introduction to Digital Forensics
Forensic engineering
Forensic archaeology
Currency notes and passports security features
Questioned documents Full PPT
Footprint case study
Criminalistics Unit 3
Unit 2 crime and society

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Classroom Observation Tools for Teachers
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
master seminar digital applications in india
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPH.pptx obstetrics and gynecology in nursing
Final Presentation General Medicine 03-08-2024.pptx
Renaissance Architecture: A Journey from Faith to Humanism
STATICS OF THE RIGID BODIES Hibbelers.pdf
TR - Agricultural Crops Production NC III.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
01-Introduction-to-Information-Management.pdf
Cell Types and Its function , kingdom of life
Classroom Observation Tools for Teachers
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
master seminar digital applications in india
Abdominal Access Techniques with Prof. Dr. R K Mishra
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...

Windows Forensics- Introduction and Analysis

  • 1. UNIT 2: WINDOWS FORENSICS DON CAEIRO
  • 3. UNDERSTANDING FILE SYSTEMS • File system • Gives OS a road map to data on a disk • Type of file system an OS uses determines how data is stored on the disk • A file system is usually directly related to an OS • When you need to access a suspect’s computer to acquire or inspect data • You should be familiar with the computer’s platform
  • 4. UNDERSTANDING DISK DRIVES • Disk drives are made up of one or more platters coated with magnetic material • Disk drive components • Geometry • Head • Tracks • Cylinders • Sectors • Holds 512 bytes, you cannot read or write anything less than a sector
  • 7. UNDERSTANDING DISK DRIVES (CONTINUED) • Properties handled at the drive’s hardware or firmware level • Zoned bit recording (ZBR) • Track density • Areal density • Head and cylinder skew
  • 9. EXPLORING MICROSOFT FILE STRUCTURES • In Microsoft file structures, sectors are grouped to form clusters • Storage allocation units of one or more sectors • Clusters are typically 512, 1024, 2048, 4096, or more bytes each • Combining sectors minimizes the overhead of writing or reading files to a disk
  • 10. EXPLORING MICROSOFT FILE STRUCTURES (CONTINUED) • Clusters are numbered sequentially starting at 2 • First sector of all disks contains a system area, the boot record, and a file structure database • OS assigns these cluster numbers, called logical addresses • Sector numbers are called physical addresses • Clusters and their addresses are specific to a logical disk drive, which is a disk partition
  • 11. DISK PARTITIONS • A partition is a logical drive • FAT16 does not recognize disks larger than 2 GB • Large disks have to be partitioned • Hidden partitions or voids • Large unused gaps between partitions on a disk • Partition gap • Unused space between partitions
  • 12. DISK PARTITIONS (CONTINUED) • Disk editor utility can alter information in partition table • To hide a partition • Can examine a partition’s physical level with a disk editor: • HxD, Norton DiskEdit, WinHex, or Hex Workshop • Analyze the key hexadecimal codes the OS uses to identify and maintain the file system
  • 13. MASTER BOOT RECORD STRUCTURE
  • 14. PARTITION TABLE STRUCTURE • From Wikipedia • Link Ch 6a
  • 16. PARTITION MARK AT START OF VOLUME • Start HxD, Extras, Open Disk • NTFS • FAT32
  • 17. BMP FILE IN HXD • Start HxD, File, Open • BM at start indicates a BMP file
  • 18. WORD DOC FILE IN HXD • Start HxD, File, Open • Word 2003 Format uses these 7 bytes • .docx format is actually a Zip archive
  • 19. MASTER BOOT RECORD • On Windows and DOS computer systems • Boot disk contains a file called the Master Boot Record (MBR) • MBR stores information about partitions on a disk and their locations, size, and other important items • Several software products can modify the MBR, such as PartitionMagic’s Boot Magic
  • 20. EXAMINING FAT DISKS • File Allocation Table (FAT) • File structure database that Microsoft originally designed for floppy disks • Used before Windows NT and 2000 • FAT database is typically written to a disk’s outermost track and contains: • Filenames, directory names, date and time stamps, the starting cluster number, and file attributes • FAT versions
  • 21. FAT VERSIONS • FAT12—for floppy disks, max size 16 MB • FAT16—allows hard disk sizes up to 2 GB • FAT32— allows hard disk sizes up to 2 TB •
  • 22. EXAMINING FAT DISKS (CONTINUED) • Cluster sizes vary according to the hard disk size and file system • This table is for FAT-16
  • 23. EXAMINING FAT DISKS (CONTINUED) • When you run out of room for an allocated cluster • OS allocates another cluster for your file, which creates more slack space on the disk • As files grow and require more disk space, assigned clusters are chained together • The chain can be broken or fragmented
  • 25. EXAMINING FAT DISKS (CONTINUED) • When the OS stores data in a FAT file system, it assigns a starting cluster position to a file • Data for the file is written to the first sector of the first assigned cluster • When this first assigned cluster is filled and runs out of room • FAT assigns the next available cluster to the file • If the next available cluster isn’t contiguous to the current cluster
  • 26. DELETING FAT FILES • In Microsoft OSs, when a file is deleted • Directory entry is marked as a deleted file • With the HEX E5 (σ) character replacing the first letter of the filename • FAT chain for that file is set to 0 • Data in the file remains on the disk drive • Area of the disk where the deleted file resides becomes unallocated disk space • Available to receive new data from newly created files or other files needing more space
  • 27. EXAMINING NTFS DISKS • New Technology File System (NTFS) • Introduced with Windows NT • Recommended file system for Windows 200 Pro, XP, and later versions through Windows 7 at least • Improvements over FAT file systems • NTFS provides more information about a file • NTFS gives more control over files and folders • NTFS was Microsoft’s move toward a journaling file system
  • 28. EXAMINING NTFS DISKS (CONTINUED) • In NTFS, everything written to the disk is considered a file • On an NTFS disk • First data set is the Partition Boot Sector • Next is Master File Table (MFT) • NTFS results in much less file slack space • Clusters are smaller for smaller disk drives • NTFS also uses Unicode • An international data format
  • 29. EXAMINING NTFS DISKS (CONTINUED)
  • 30. NTFS FILE SYSTEM • MFT contains information about all files on the disk • Including the system files the OS uses • In the MFT, the first 15 records are reserved for system files • Records in the MFT are called metadata
  • 31. NTFS FILE SYSTEM (CONTINUED)
  • 32. NTFS FILE SYSTEM (CONTINUED)
  • 33. MFT AND FILE ATTRIBUTES • In the NTFS MFT • All files and folders are stored in separate records of 1024 bytes each • Each record contains file or folder information • This information is divided into record fields containing metadata • A record field is referred to as an attribute ID • File or folder information is typically stored in one of two ways in an MFT record:
  • 34. RESIDENT FILE IN A MFT RECORD
  • 35. MFT AND FILE ATTRIBUTES (CONTINUED) • When a disk is created as an NTFS file structure • OS assigns logical clusters to the entire disk partition • These assigned clusters are called logical cluster numbers (LCNs) • Become the addresses that allow the MFT to link to nonresident files on the disk’s partition
  • 36. NTFS COMPRESSED FILES • NTFS provides compression similar to FAT DriveSpace 3 • Under NTFS, files, folders, or entire volumes can be compressed • Most computer forensics tools can uncompress and analyze compressed Windows data
  • 37. NTFS ENCRYPTING FILE SYSTEM (EFS) • Encrypting File System (EFS) • Introduced with Windows 2000 • Implements a public key and private key method of encrypting files, folders, or disk volumes • When EFS is used in Windows 2000 • A recovery certificate is generated and sent to the local Windows administrator account • Users can apply EFS to files stored on their local workstations or a remote server
  • 38. DELETING NTFS FILES • When a file is deleted in Windows XP, 2000, or NT • The OS renames it and moves it to the Recycle Bin • Can use the Del (delete) MS-DOS command • Eliminates the file from the MFT listing in the same way FAT does
  • 40. UNDERSTANDING THE WINDOWS REGISTRY • Registry • A database that stores hardware and software configuration information, network connections, user preferences, and setup information • For investigative purposes, the Registry can contain valuable evidence • To view the Registry, you can use: • Regedit (Registry Editor) program for Windows 9x systems • Regedt32 for Windows 2000 and XP
  • 41. EXPLORING THE ORGANIZATION OF THE WINDOWS REGISTRY (CONTINUED)
  • 42. EXPLORING THE ORGANIZATION OF THE WINDOWS REGISTRY (CONTINUED)
  • 44. UNDERSTANDING MICROSOFT STARTUP TASKS • Learn what files are accessed when Windows starts • This information helps you determine when a suspect’s computer was last accessed • Important with computers that might have been used after an incident was reported
  • 45. STARTUP IN WINDOWS NT AND LATER • All Windows NT computers perform the following steps when the computer is turned on: • Power-on self test (POST) • Initial startup • Boot loader • Hardware detection and configuration • Kernel loading • User logon
  • 46. STARTUP PROCESS FOR WINDOWS VISTA • Uses the new Extensible Firmware Interface ( EFI) as well as the older BIOS sys-tem. • NT Loader (NTLDR) has been replaced by three boot utilities • Bootmgr.exe—displays list of operating systems • Winload.exe—loads kernel, HAL, and drivers • Winresume.exe—restarts Vista after hibernation • See link Ch 6g
  • 47. STARTUP FILES FOR WINDOWS XP • NT Loader (NTLDR) • Boot.ini • BootSect.dos • NTDetect.com • NTBootdd.sys • Ntoskrnl.exe • Hal.dll • Pagefile.sys • Device drivers
  • 48. STARTUP IN WINDOWS NT AND LATER (CONTINUED) • Windows XP System Files
  • 49. STARTUP IN WINDOWS NT AND LATER (CONTINUED) • Contamination Concerns with Windows XP • When you start a Windows XP NTFS workstation, several files are accessed immediately • The last access date and time stamp for the files change to the current date and time • Destroys any potential evidence • That shows when a Windows XP workstation was last used
  • 50. STARTUP IN WINDOWS 9X/ME • System files in Windows 9x/Me containing valuable information can be altered easily during startup • Windows 9x and Windows Me have similar boot processes • With Windows Me you can’t boot to a true MS-DOS mode • Windows 9x OSs have two modes: • DOS protected-mode interface (DPMI) • Protected-mode GUI
  • 51. STARTUP IN WINDOWS 9X/ME (CONTINUED) • The system files used by Windows 9x have their origin in MS-DOS 6.22 • Io.sys communicates between a computer’s BIOS, the hardware, and the OS kernel • If F8 is pressed during startup, Io.sys loads the Windows Startup menu • Msdos.sys is a hidden text file containing startup options for Windows 9x • Command.com provides a command prompt when booting to MS-DOS mode (DPMI)
  • 53. UNDERSTANDING MS-DOS STARTUP TASKS • Two files are used to configure MS-DOS at startup: • Config.sys • A text file containing commands that typically run only at system startup to enhance the computer’s DOS configuration • Autoexec.bat • A batch file containing customized settings for MS-DOS that runs automatically • Io.sys is the first file loaded after the ROM bootstrap loader finds the disk drive
  • 54. UNDERSTANDING MS-DOS STARTUP TASKS (CONTINUED) • Msdos.sys is the second program to load into RAM immediately after Io.sys • It looks for the Config.sys file to configure device drivers and other settings • Msdos.sys then loads Command.com • As the loading of Command.com nears completion, Msdos.sys looks for and loads Autoexec.bat
  • 55. OTHER DISK OPERATING SYSTEMS • Control Program for Microprocessors (CP/M) • First nonspecific microcomputer OS • Created by Digital Research in 1970 • 8-inch floppy drives; no support for hard drives • Digital Research Disk Operating System (DR-DOS) • Developed in 1988 to compete with MS-DOS • Used FAT12 and FAT16 and had a richer command environment
  • 56. SRUM
  • 57. SYSTEM RESOURCE USER MANAGEMENT (SRUM) • User management is about interfacing humans to computers. This brings to light a number of issues:Accounting: Registering new users and deleting old ones.Comfort and convenience.Support services.Ethical issues.Trust management and security.
  • 58. SYSTEM ADMINISTRATION DUTIES Analyse system logs and identify potential issues that need attention. Introduce and integrate new technologies. Performing backups. Updating OSs and applying patches and configuration changes. Installing and configuring new hardware and software. Configure, monitor and maintain: – Email applications – Virus protection software – Etc
  • 59. • forensic analysis of a data set that spans multiple drives.

Editor's Notes

  • #60: https://dfrws.org/sites/default/files/session-files/2006_USA_paper-cross-drive_analysis.pdf