240 likes | 368 Views
Chapter 9: Registry Evidence. Mastering Windows Network Forensics and Investigation. Evidence in Software Key:. HKLMSOFTWARE % SystemRoot %system32 config software Installed software Other locations for installed software HKLMSOFTWAREMicrosoftWindows CurrentVersion App Paths
E N D
Chapter 9: Registry Evidence Mastering Windows Network Forensics and Investigation
Evidence in Software Key: • HKLM\SOFTWARE • %SystemRoot%\system32\config\software • Installed software • Other locations for installed software • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Evidence in Software Key: • Last Logon • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon • Banners • HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Action Center & Firewall Settings: • Action Center • Advises user if firewall off, anti-virus not installed or out of date, or if updates not turned on or out of date • Settings stored in: • HKLM\SOFTWARE\Microsoft\Security Center OR • HKCU\SOFTWARE\Microsoft\ Windows\CurrentVersion\ActionCenter
Security Center & Firewall Settings: • Windows Firewall • Released with XP Service Pack 2 • Firewall is on by default • Powerful logging utility, but is off by default in Windows XP • Settings stored in registry • HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy
Firewall Settings: • Settings stored in registry • Subkey “DomainProfile” for domain • Subkey “StandardProfile” for local machine • Subkeys under each of the above: • “AuthorizedApplications “ • “GloballyOpenPorts” • Subkey under each of the above: • “List” – lists settings in plain text
Restore Point Registry Hive Files: • Restore points started with XP / ME • Snapshot of system files taken every 24 hrs or when software installed, update installed, or when unsigned driver installed – User can create! • Stored for up to 90 days if disk space available
Restore Point Registry Hive Files: • Settings stored in registry at: • HKLM\Software\Microsoft\WindowsNT\CurrentVersion\SystemRestore • Restore points stored in • C:\System Volume Information\restore{GUID}\RP## • ## is sequentially numbered restore points
Restore Point Registry Hive Files: • Registry hive files stored under snapshot folder and are renamed
Volume Shadow Copy Service • Greater number of file types are tracked in VSC – Entire Volume! • Every file that changed since the last snapshot is included in VSC restore point • Still located in System Volume Information folder but with different name
Volume Shadow Copy Service • Registry key tracking the monitored volumes: HKLM\Software\Microsoft\WindowsNT\CurrentVersion\SPP\Clients\{09F7EDC5-294E-4180-AF6A-FB0E6A0E9513} • Access VSC by using vssadmin command and creating symbolic link • The conduct analysis as if the data was it’s own logical volume
Security Identifiers: • SID is a security identifier • SID is a unique identifier in that no two SIDs • Windows grants or denies access and privileges to system objects based on access control lists (ACLs), which in turn use the SID as a means of identifying users, groups, and machines, since each has its own unique SID
Security Identifiers: • SID’s to User mapping is stored in SAM for a local logon • In a domain, SID to User resolution is stored in Active Directory on Domain Controller • Backdoor to resolving SID to User in a domain setting at key: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList
User Activities: • NTUSER.DAT contains user specific settings about installed software • For pre-IE7, Protected Storage System Provider contains encrypted values for MSIE “Autocomplete” and stored user names and passwords • For post-IE7 autocomplete information is stored in IntelliForms • HKCU\Software\Microsoft\Internet Explorer\IntelliForms\
User Activities: • MRU’s “most recently used” • RunMRU • MRUList • HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs • HKCU\Software\Microsoft\Internet Explorer\TypedURLs
User Activities: • UserAssist key • HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist • Value names under “Count” stored in ROT13 • 2nd dWord value is count starting at 5 (Windows XP, Vista, 2003, 2008) or 1 (Windows 7) • Last eight bytes 64 bit Windows timestamp indicating last time user launched
LSA Secrets: • LSA stands for Local Security Authority • SECURITY\Policy\Secrets • Contains security information regarding various service accounts and other accounts necessary for Windows and is stored by the service control manager • Tools to extract: • Lsadump2.exe • Cain
IP Addresses: • Stored in registry • HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces • Subkeys are interfaces and appear with GUID names • Static vs Dynamic addresses
Time Zone Offsets: • NTFS stores timestamps in GMT • Windows displays time to user based on local host time zone offset. • Time zone offset stored in registry • HKLM\SYSTEM\CurrentControlSet\Control\TimeZoneInformation
Startup Locations: • Many locations within Windows where programs or code runs with Windows boot, user logon, etc • Registry alone contains dozens of locations and methods • Windows configuration files can also be used to run code • List of these locations is extensive
Startup Locations: • If you know what the bad code is and its file name it’s easier to search registry and Windows configuration files for file name • When unknown, use tools such as • EnCase Scan Registry Enscript • Autoruns by Sysinternals
Where are auditing settings stored? • In most cases you won’t be able to open the LSS applet to determine auditing level on live system • Stored in registry: HKLM\SECURITY\Policy\PolAdtEv