Chapter 17 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of Windows Systems.

Slides:



Advertisements
Similar presentations
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Advertisements

Chapter 20 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of Mobile Devices (online only)
Mastering Windows Network Forensics and Investigation Chapter 7: Windows File Systems.
BACS 371 Computer Forensics
Mastering Windows Network Forensics and Investigation Chapter 7: Windows File Systems.
Chapter 22 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Applying Forensic Science to Networks.
Chapter 24 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Digital Evidence on Physical and Data-Link Layers.
Bits, Bytes, Files, Hard Drives. Bits, Bytes, Letters and Words ● Bit – single piece of information ● Either a 0 or a 1 ● Byte – 8 bits of information.
Chapter 13 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.. Investigating Computer Intrusions.
Chapter 16 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Applying Forensic Science to Computers.
Chapter 21 Network Basics for Digital Investigators ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Chapter 18 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of UNIX Systems.
McGraw-Hill/Irwin The I-Series © 2002 The McGraw-Hill Companies, Inc. All rights reserved. Windows XP Network Services Chapter 8 - Objectives.
Chapter 19 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of Macintosh Systems.
Chapter 15 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Computer Basics for Digital Investigators.
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Modeling Constraints with Parametrics
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Copyright © 2016 Elsevier Inc. All rights reserved.
Chapter 01 Foundations of Digital Forensics
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Chapter 41 Work-Related Musculo-Skeletal Disorders
Chapter 65 - The Hormonal Regulation of Calcium Metabolism
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 11.
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 10.
Chapter 28 - Renal Hyperplasia and Hypertrophy
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Modeling Cross-Cutting Relationships with Allocations
Portable Biotechnology
© 2012 Elsevier, Inc. All rights reserved.
Modeling Text-Based Requirements and their Relationship to Design
Modeling Functionality with Use Cases
Customizing SysML for Specific Domains
Copyright © 2012, Elsevier Inc. All rights Reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 12.
Chapter 6.
Chapter 6.
Copyright © 2012, Elsevier Inc. All rights Reserved.
© 2012 Elsevier, Inc. All rights reserved.
Chapter 103 Long-Term Care: The Global Impact
Chapter 01.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 08.
FAT File System.
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 64 - Renal Calcium Metabolism
© 2015 Elsevier, Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2012, Elsevier Inc. All rights Reserved.
Chapter 15 Contraception
Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 15.
Chapter 20 Assisted Reproductive Technologies
Chapter 3.
© 2015 Elsevier, Inc. All rights reserved.
Presentation transcript:

Chapter 17 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Forensic Examination of Windows Systems

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 17.1 Root directory (skyways-getafix.doc, starts in cluster 184) ® FAT ® data in clusters (42 clusters × 512 bytes/clusters = 21,504 bytes).

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 17.2 Root directory of floppy diskette viewed using X-Ways Forensics.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 17.3 Example of SleuthKit viewing MFT entry with full details.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 17.4 Diagram of file with a logical size that is larger than its valid data length, leaving uninitialized space..

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 17.5 MFT entry with logical size and valid data length viewed using X-Ways Forensics..

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 17.6 Folder entries with 32-bit MS-DOS date-time stamps viewed in X-Ways. file shares.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 17.7 DCode used to convert 64-bit FILETIME date-time stamps from their hexadecimal representation..

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 17.8 The Sleuth Kit and Autopsy Forensic Browser being used to examine a FAT file system (checkmarks indicate files are deleted).

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE 17.9 DataLifter being used to carve files from two blobs of unallocated space and one blob of file slack from a system.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE File slack of a recovered file viewed using EnCase.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE Internet Account Manager.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE A cookie created by MS Internet Explorer showing recent Mapquest searches viewed using CookieView (

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE FTK showing Word document as attachments (base 64 encoded).

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE Registry showing remote systems recently accessed using Telnet.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE Network Neighborhood on a Windows XP computer connected to a home network.

Figure 1.1 Copyright © 2011 Academic Press Inc.©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. FIGURE Active network file shares.