Windows Registry Analysis PDF
Windows Registry Analysis PDF
Windows Registry Analysis PDF
SID: S-1-0
Name: Null Authority
Description: An identifier authority.
SID: S-1-0-0
Name: Nobody
Description: No security principal.
SID: S-1-1
Name: World Authority
Description: An identifier authority.
SID: S-1-1-0
Name: Everyone
Description: A group that includes all users, even anonymous users and
guests. Membership is controlled by the operating system.
SID: S-1-2
Name: Local Authority
Description: An identifier authority.
SID: S-1-3
Name: Creator Authority
Description: An identifier authority.
SID
Security ID
NT/2000/XP/2003
HKLM>SAM>Domains>Accounts>Aliases>Members
This key will provide information on the computer identifier
HKLM>SAM>Domains>Users
This key will provide information in hexadecimal
User ID
Administrator – 500
Guest – 501
Global Groups ID
Administrators – 512
Users – 513
Guest - 514
MRU
Registry Analysis:
Perform a GUI-based live-system analysis.
Easiest, but most likely to incur changes.
Use regedit.
Perform a command-line live-system analysis
Less risky
Use “reg” command.
Remote live system analysis
regedit allows access to a remote registry
Superscan from Foundstone
Offline analysis on registry files.
Encase, FTK (Access data) have specialized tools
regedit on registry dump.
Registry Forensics
Websites
Registry Forensics: NTUSER.DAT
AOL Instant Messenger Away messages
File Transfer & Sharing
Last User
Profile Info
Recent Contacts
Registered Users
Saved Buddy List
Registry Forensics: NTUSER.DAT
ICQ
IM contacts, file transfer info etc.
User Identification Number
Last logged in user
Nickname of user
Registry Forensics: NTUSER.DAT
Internet Explorer
IE auto logon and password
IE search terms
IE settings
Typed URLs
Auto-complete passwords
Registry Forensics: NTUSER.DAT
IE explorer Typed URLs
Registry Forensics: NTUSER.DAT
MSN Messenger
IM groups, contacts, …
Location of message history files
Location of saved contact list files
Registry Forensics: NTUSER.DAT
Case Study
(Chad Steel: Windows Forensics, Wiley)
Department manager alleges that individual copied
confidential information on DVD.
No DVD burner was issued or found.
Laptop was analyzed.
Found USB device entry in registry:
PLEXTOR DVDR PX-708A
Found software key for Nero - Burning ROM in registry
Therefore, looked for and found Nero compilation files (.nrc).
Found other compilation files, including ISO image files.
Image files contained DVD-format and AVI format versions of
copyrighted movies.
Conclusion: No evidence that company information was
burned to disk. However, laptop was used to burn
Registry Forensics
Intelliform:
Autocomplete feature for fast form filling
Uses values stored in the registry
HKEY_CURRENT_USER\Software\Microsoft\Protected
Storage System Provider
Only visible to SYSTEM account
Accessible with tools such as Windows Secret
Explorer.
Registry Forensics:
AutoStart Viewer (DiamondCS)
Registry Research
Software Key
Last Logon
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\WinLogon
Logon Banner Text / Legal Notice
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\WinLogon
Security Center Settings
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Shar
edAccess\Parameters\FirewallPolicy
If firewall logging is enabled, the log is typically at %SystemRoot
%/pfirewall.log
Registry Forensics Investigation
Registry Forensics Investigation
Analyze Restore Point Settings
Restore points developed for Win ME / XP
Restore point settings at
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\SystemRestore
Restore points created every RPGlobalInterval value
seconds (~every 24h)
Retention period is RPLifeInterval seconds (default 90
days)
Restore point taking in ON by default
Restore points in System Volume Information\restore…
Registry Forensics Investigation
Aside: How to access restore points
Restore points are protected from user, including
administrator
Administrator can add her/himself to the access
list of the system volume directory
Turn off “Use simple file sharing” in Control Panel
Folder Options
Click on “Properties” of the directory in Explorer and
Registry Forensics Investigation
Restore point
makes copies of important system and program
files that were added since the last restore
points
Files
Stored in root of RP### folder
Names have changed
File extension is unchanged
Name changes kept in change.log file
Registry data
in Snapshot folder
Names have changed, but predictably so
Registry Forensics Investigation
SID (security identifier)
Well-known SIDs
SID: S-1-0 Name: Null Authority
SID: S-1-5-2 Name: Network
S-1-5-21-2553256115-2633344321-4076599324-1006
S string is SID
1 revision number
5 authority level (from 0 to 5)
21-2553256115-2633344321-4076599324 domain or local computer
identifier
1006 RID – Relative identifier
Local SAM resolves SID for locally authenticated users (not
domain users)
Use recycle bin to check for owners
Registry Forensics Investigation