Cyber Crime and Cyber Terrorism


Table 7.3  HKEY Functions HKEY



Download 5,67 Mb.
Pdf ko'rish
bet94/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   90   91   92   93   94   95   96   97   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

Table 7.3 
HKEY Functions
HKEY
HKEY Function
HKLM
Contains the systems installed hardware, software and boot information
HKU
Contains the settings for all currently active user profile of the system
HKCU
A symbolic link to HKU for your user id, i.e., the account you are logged 
in with
HKCR
A symbolic link to an HKLM key containing file type and extension 
information
HKCC
A link to HKLM for the hardware profile is use


87
 
System volume information folders
system needs more RAM than is available, some of it can be written to a page file 
before being released and freeing physical memory. When the information in the 
page file is required by a running process, it is retrieved back into memory from the 
file. Since the file contains data which has been held in RAM, it can be an invalu-
able source of evidence for the examiner, e.g., contraband images, passwords, digital 
signatures, and so forth. All of the previously mentioned forensic tools, e.g., Encase, 
FTK and Autopsy are capable of carving the 
pagefil.sys
file to allow viewing and 
extracting of evidence from it.
SYSTEM VOLUME INFORMATION FOLDERS
Operating systems from XP onwards have a feature call system restore. System re-
store holds a “snapshot” of the state of important operating system e.g., Windows, 
files on a hard drive at any given time. If something goes wrong with the PC, a 
failed installation of some software for instance, which causes the PC to become 
inoperable or unstable, it can be “rolled back,” that is to say restored to this snap 
shot. The previous versions of the files would be recovered and the PC should be-
come functional again. The native default behavior is that these snapshots are cre-
ated on Windows 7 once a week and at the start of a software installation process. 
Alternatively they can be set manually. System restore has a fixed amount of space 
which is used for storing the restore points and will save as many as it can into 
that space on a round robin basis, with the oldest restore points being overwritten 
with the latest ones. The amount of space is configurable, but is 15% as a default 
in Windows Vista and 7.
From a forensic perspective these snapshots may contain copies of files which 
have subsequently been deleted or modified. Of significance when considering 
this is that copies of files which have become encrypted may still exist in sys-
tem volume information folders in an unencrypted state. Thus, while it is often 
infeasible to decrypt certain files, it may be possible to find a copy of them unen-
crypted in the system volume information folders. The snapshots include backups 
of the registry, Windows system files (in the 
\Windows
folder) and the local us-
ers profile. The users profile contains artifacts including any files stored in the 
“My Documents” area, application settings, internet favorites, the user’s desktop 
(including any files saved to it), internet cookies, links to shared folders, and the 
recycle bin. The later can be particularly lucrative as the suspect may have emp-
tied the live system’s recycle bin yet be unaware that the files are still captured in 
recycle bin in the system volume information folders. System volume information 
folders sit on the root of the hard drive within a folder named “System Volume 
Information.” Within this folder a separate volume copy set exists for each of the 
restore points created. Many forensic tools are capable of parsing the informa-
tion in system volume information folders natively. Alternatively, the folders can 
be mounted as drives manually. The process for doing this is well recognized, 
with a step-by-step procedure documented in Microsoft’s knowledge base article 



Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   90   91   92   93   94   95   96   97   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish