File Analysis Chapter 5 – Harlan Carvey Event Logs File Metadata.

Slides:



Advertisements
Similar presentations
Forensic Analysis of Internet Explorer Activity Files Based on article by Keith J. Jones Foundstone
Advertisements

Week 6: Chapter 6 Agenda Automation of SQL Server tasks using: SQL Server Agent Scheduling Scripting Technologies.
Snort & ACID. UTSA IS 6973 Computer Forensics SNORT.
Microsoft Office Excel 2013 Core Microsoft Office Excel 2013 Core Courseware # 3253 Lesson 8: Macros, Importing and Exporting Data.
Mastering Windows Network Forensics and Investigation Chapter 15: Forensic Analysis of Event Logs.
Lesson 17: Configuring Security Policies
Computer Forensic Tools. Computer Forensics: A Brief Overview Scientific process of preserving, identifying, extracting, documenting, and interpreting.
Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Chapter 11 - Monitoring Server Performance1 Ch. 11 – Monitoring Server Performance MIS 431 – created Spring 2006.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Operating Systems.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Module 8: Monitoring SQL Server for Performance. Overview Why to Monitor SQL Server Performance Monitoring and Tuning Tools for Monitoring SQL Server.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
© N. Ganesan, Ph.D., All rights reserved. Active Directory Nanda Ganesan, Ph.D.
Operating System & Application Files BACS 371 Computer Forensics.
Mastering Windows Network Forensics and Investigation Chapter 14: Other Audit Events.
Module 8: Implementing Administrative Templates and Audit Policy.
OS and Application Files BACS 371 Computer Forensics.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Getting Started with Adobe Photoshop CS6
1 Chapter Overview Planning an Audit Policy Implementing an Audit Policy Using Event Viewer.
Managing Local and Network Printer Chapter 11 powered by dj.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
Chapter 7 Working with Files.
ACCESSDATA® FORENSICS Windows 7 Registry Artifacts
WINDOWS SYSTEMS AND ARTIFACTS John P. Abraham Professor UTPA.
Objectives Learn what a file system does
Why Copy , Attachments and other files to CD or DVD? Backup mail & files in case of computer failure or disaster. Archive old messages & files before.
Mastering Windows Network Forensics and Investigation Chapter 12: Windows Event Logs.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
1Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall. Exploring Microsoft Office Access 2010 by Robert Grauer, Keith Mast, and Mary Anne.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Tool Names: 1. VISION 2. PASCO 3. GALLETA. Tool 1 VISION.
ASP.NET The Clock Project. The ASP.NET Clock Project The ASP.NET Clock Project is the topic of Chapter 23. By completing the clock project, you will learn.
Liang, Introduction to Java Programming, Eighth Edition, (c) 2011 Pearson Education, Inc. All rights reserved Introduction to Android (Part.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Configuring Data Protection Chapter 12 powered by dj.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
IST 222 Day 3. Homework for Today Take up homework and go over Go to Microsoft website and check out their hardware compatibility list.
Lecture 18 Windows – NT File System (NTFS)
Computing Fundamentals Module Lesson 7 — The Windows Operating System Computer Literacy BASICS.
Files Chapter 4.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Chapter 1 Getting Started with Adobe Photoshop CS4.
8 Chapter Eight Server-side Scripts. 8 Chapter Objectives Create dynamic Web pages that retrieve and display database data using Active Server Pages Process.
Module 10: Implementing Administrative Templates and Audit Policy.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
CMPF124 Personal Productivity with Information Technology Chapter 2 – Part 3 Introduction To Windows Operating Systems Windows Accessories CMPF 112 : COMPUTING.
NTFS Filing System CHAPTER 9. New Technology File System (NTFS) Started with Window NT in 1993, Windows XP, 2000, Server 2003, 2008, and Window 7 also.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 File Systems September 22, 2008.
Chapter 8 File Systems FAT 12/16/32. Defragmentation Defrag a hard drive – Control Panel  System and Security  Administration tools  Defrag hard drive.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
Chapter Objectives In this chapter, you will learn:
MONITORING MICROSOFT WINDOWS SERVER 2003
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Forensic Analysis of Internet Explorer Activity Files
CIS MS Windows Operating System
Windows Operating System
Presentation transcript:

File Analysis Chapter 5 – Harlan Carvey Event Logs File Metadata

Event Logs Logging Events Events Logging Events Event Log Format Event Record Structure Various Logs

Usual Event Logs Application Log of application errors, warnings and information Security Dropped Packets, Successful Connections Logon/Logoffs System Various device events

Registry References - XP

Windows 7 Location of logs

Event Log Location - XP

Event Log Location Vista, Win7 C:Windows->System32->winevt->Logs

Location of Event Logs

App & System Logging On by default Log size is 512 KB by default Written by the application

Security Logging - XP Not on by default Log size is 512 KB by default Control Panel Admin tools -> Local Security Policy

Security Logging Windows 7

Log Viewer Event Viewer Control Panel -> Administrative Tools -> Event Viewer Application, Security and System logs available Event Properties DTG of the event Important for some timelines

App Log

System Log

Security Log Success

Security Log Failure

Windows 7

Event Viewer Convenient and pretty Works only on live systems Does not work on a forensics image We have to parse the event logs

Event Logs Binary Structure Header and a series of records Event ID formats vent.aspx?eventid=528 Application logs are vendor specific EventID.net is a good source for this info - $$$ blogs.msdn.com/ericfiz/default.aspx

Event Log Configuration XP Held in registry keys

Windows 7

Registry Viewer Event message

Event Log File Format XP only Event Log Header – 12 DWORD values Event Records – Variable length Windows 7 & Vista sta_Event_Log.pdfhttp://computer.forensikblog.de/files/talks/SANS_Summit_Vi sta_Event_Log.pdf

OffsetSizeDescription 04 bytesSize of the record (Header = 0x30, Event = 0xF4) 44 bytesMagic number 0x4C 66 4C 65 = LfLe 164 bytesOffset within the.evt file of the oldest event record 204 bytesOffset within the.evt file of the next event record to be written 244 bytesID of the next event record 284 bytesID of the oldest event record 324 bytesMaximum size of the.evt file (from the registry) 404 bytesRetention time of event records (from the registry) 444 bytesSize of the record (repeat of the first DWORD) Event Log Header Structure

OffsetSizeDescription 04 bytesSize of the record (Header = 0x30, Event = 0xF4) 44 bytesMagic number 0x4C 66 4C 65 = LfLe 84 bytesRecord Number 124 bytesTime Generated 164 bytesTime written 204 bytesEvent ID – Locates message file/dll/exe 242 bytesEvent type (0x01 = error, 0x10 = Failure, 0x08 – Success, 0x04 = Info, 0x02 = Warning 262 bytesNumber of strings 282 bytesEvent category 302 bytesReserved flags 324 bytesClosing record number 364 bytesString offset 404 bytesLength of user SSID 444 bytesOffset to the user SID within this event record 484 bytesData length; length of the binary data associated with this event record 524 bytesOffset to data Event Record Structure

Carvey’s Help Best not to depend on the Window’s API to read the Event files They can be corrupted May miss the next to be over written Provides summary stats Provides output readable in Excel

evtstats.exe Lots of events

lsevt.exe Entry for each of the 2464 Event Records

lsevt2.exe Entry for each of the 2464 Event Records Puts it into an Excel readable format lsevt –f event_file –c > save_file.csv

Excel – Open.csv file

Change Format Choose Delimited

Identify Separators Harlan’s stuff is separated by semicolons. With Perl knowledge you could change it.

Excel Manipulatible

Information

Other Logs IE Browsing History Set Up XP Firewall Recycle Bin Shortcut Files

IE Browsing History Index.dat files DiscoverPro NetAnalysis Index dat spy SuperWinSpy Be careful !!!

NetAnalysis

Set Up Logs Setuplog.txt Setupact.log SetupAPI.log Netsetup.log

Setuplog.txt C:\WINDOWS

Setupact.log C:\WINDOWS

SetupAPI.log C:\WINDOWS

NetSetup.log c:\Winodws\Debug

Task Scheduler Log SchedLgU.txt

Enabling Firewall Logging Control Panel -> Security Center -> Windows Firewall -> Advanced Follow your nose

Firewall Log C:\WINDOWS\pfirewall.log

Recycle Bin C:\RECYCLER Each user gets his own folder Use the user’s SID Each has its own INFO2 file

Recycle Bin

recbin.exe

INFO2 File Structure Header 16 bytes Final 4 bytes (DWORD) is the size of each record 0x320 (little endian) = 800 bytes Records Record # at offset 264 within the record Drive designator at offset = C:\, 3=D:\, etc File size in clusters at offset 280

Open INFO2 in WinHex Very hard File -> Open Navigate to C:\RECYCLER Open it Select a SID file Open it. It may say you don’t have privileges Type \INFO2 Try again! Maybe

INFO2 Record Size Record size 0x00320 = Drive indicator 0x0002 Size in clusters 0x0001

File Metadata MAC Times OS - OSActionFromToCreate timeModification time FAT to FATCopyC:\ UpdatedUnchanged FAT to FATMoveC:\ Unchanged FAT to NTFSCopyUpdatedUnchanged FAT to NTFSMoveUnchanged NTFS to NTFSCopyC:\ UpdatedUnchanged NTFS to NTFSMoveC:\ Unchanged

Word Documents Document location Statistics Magic number Version and Language Last 10 authors MACPS times Modified, accessed, created, printed, saved

MeargeStreams Insert a spreadsheet into a word document Call it.doc – you see the Word document Call it.xls – you see the spreadsheet All sorts of uses Smuggling out forecasts Sharing pictures on the corporate server

PDF Files Similar metadata as Word docs. Easily accessed File -> Properties

Image Files exif Data

Original Photo off of the camera After Photoshop manipulation

Tweet Metadata

ADS – Alternative Data Streams Native to NTFS Permits data file to contain scripts, or executable code No NT native tools to detect them Native tools to create and launch them