Avançar para o conteúdo principal

Windows Registry Forensics - Book Review

A couple of months ago I finished reading my first Harlan Carvey book - Windows Registry Forensics. I must say I loved it and learn a lot.


Chapter 1 - Registry Analysis - In this chapter Harlan introduces the foundations needed to build the knowledge he intended to share with the book. It goes into the Microsoft Windows Registry internal structure and basics Digital Forensics investigation principals like the Locard's Exchange Principal and the Least Frequency of Occurrence.

I really like this phrase.
Something that is very important to keep in mind when considering whether to engage in live response activities ( as opposed to acquiring and image of the hard drive and conducting postmortem analysis) is that while actions do have an effect on the system (processes loaded into memory, files created on the system as a result of your actions, etc) so does your inaction.  - Harlan Carvey , Windows Registry Forensics



Chapter 2 - Processes and Tools - This chapter presents some tools we can use while diving deep in the Windows Registry. It is showed the differences between registry viewing applications and registry parsers and it's pro and cons. Is in this chapter that Harlan's RegRipper application is introduced

Chapter 3 - Analyzing the System Hives- It is in this chapter that you roll up your sleeves and start digging deep in the Microsoft Windows Registry Hives. The Hives in the spot light in this chapter are Security, SAM, System, Software and AmCache. As Harlan mentions it is not a full coverage of every artifacts useful but a collections intended to introduce the reader to the thematic of Windows Registry Forensics. This chapter is well written and present the message in a very easy to digest way.

Part of computer forensic analysis is not just recognizing what is out of place or unusual; it's also recognizing when some artifacts should be present, but isn't. - Harlan Carvey, Windows Registry Forensics

Chapter 4 - Case Studies: User Hives - This chapter is dedicated to the discussion of user hives, NTUSER.DAT and USRCLASS.DAT. I enjoyed learning that there is an artifacts that saves the images viewed with Microsoft Windows Photos. I will surely remember that when investigating a Windows 8 system.

Chapter 5 - Regripper - In this chapter Harlan talks about his tool regripper and some way you can improve your workflow using it. He talks about creating and using profiles, plugins ultimately contributing to the project itself.

Closing remarks: 
I really enjoyed reading this book I fell like it improved me as a forensicator. The only complain I have is that I found myself referencing this book more and more and the index is to high level for me and I never caught the hang of reading the remissive index.

Comentários

Mensagens populares deste blogue

Forensic Analysis of Revo Uninstaller Pro

In a recent engagement I found an application that I never encounter before. I searched a bit online but I couldn't find any articles related to this application and the artifacts it leaves behind. This guide is by no means an exhaustive examination of the application. Revo Uninstaller Pro[1] is an application that enabled the users to remove applications from the computer. But the most interesting feature is that it enabled the user to remove some Windows Artifacts like, Web History, Search History, UserAssist, comDlg32, etc. Windows Registry Artifacts While installing the tool I found that it creates Windows Registry keys in the user NTUSER.DAT Hive. The location of the data is " Software\VS Revo Group\Revo Uninstaller Pro\". The " TrackCleaner " subkey stores the user settings responsible for deleting various windows artifacts. The Last Write Time is not the last execution date but the last time that the user changed the settings. For exa

Yet Another DFIR Blog!

Well yes. I created another Digital Forensics & Incident Response Blog. You may ask why. I recently read the Rob Lee[1] and Harlan Carvey[2] blog posts and was motivated to give something back to the community. I am by no means an Expert Forensicator like some heavy hitters in the community but I am willing to share my knowledge and learn with you if you so choose to write a comment to my upcoming blog posts. So Who Am I? I am a digital forensics & incident response Portuguese consultant. I work from the most simple incident/digital forensic investigation to enterprise wide engagements in some critical infrastructure in Portugal. I recently finished SANS FOR508 and got my GCFA. I hope with this blog I can improve the body of knowledge in the digital forensics & incident response industry and get some fun out of it. Feel free to get in though with me. I would love to hear from you. [1] https://www.sans.org/blog/how-to-make-a-difference-in-the-digital-forensics