Brain Dump

Windows Forensics

Tags
security

OS Forensics targeting the windows operating system. The most [see page 2, widely] used OS as of now.

Registry

Each user profile will have its own registry hive (example: NTUSER.DAT).

Windows registry is separated into different [see page 7, hives] such as:

HiveDescription
HKEY_LOCAL_MACHINE\SYSTEM:\system32\config\systemInfo about system, hardware config, etc.
HKEY_LOCAL_MACHINE\SYSTEM:\system32\config\securityPath and password information
HKEY_LOCAL_MACHINE\SYSTEM:\system32\config\samSecurity accounts monitor, logon info about user
HKEY_LOCAL_MACHINE\SYSTEM:\system32\config\softwareApplications installed and default settings
HKEY_USERS\UserProfile:\winnt\profiles\usernameUser accounts
HKEY_USERS.DEFAULT:\system32\config\default

We can also find private info in the [see page 11, file-system] and registry:

PathDescription
C:\Documents and Settings\Administrator\CookiesCookies
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet FilesTemporary Internet Files
~\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.datInternet History