Question

In: Computer Science

List three different digital artifacts contained within a Windows operating system and how they can be...

List three different digital artifacts contained within a Windows operating system and how they can be used by a forensics analyst during a digital forensics investigation.

Solutions

Expert Solution

Answer:

Windows contains various Digital Artifacts that have very important information related to the activities performed by the computer user. These digital artifacts in Windows play a crucial role in digital forensics examination. Some of the digital srtifacts are givn below.

  1. Registry Files
  2. Event Log
  3. Links Files
  4. Recycle Bin
  5. Internet Browser History
  6. Prefetch Files

Lets taik about the first 3 artifacts in details -

Registry Files - Windows registry files are very important digital artifact for any forensic investigator. The registry contains system setting for programs, hardware devices, user preferences, and operating-system and configurations.for Windows operating system. The registry keeps the records of Operating System and program settings but it also monitors and records user-specific data. Most of the time users do not interact with the registry but they interact indirectly with it via installation routines, applications, and programs, such as Microsoft Installer files because whenever a new application is installed or uninstalled window require to make changes in Registry files. The Windows Registry is accessed and configured using the Registry Editor program, a free registry editing utility included by default with every version of Microsoft Windows going back to Windows 95.
Registry Editor isn't a program you download. Instead, it can be accessed by executing regedit from the Command Prompt or from the search or Run box from the Start menu.
The registry contains registry values located within registry keys (folders that contain more data), all within one of several registry hives (folders that categorize all the data in the registry using subfolders). Making changes to these values and keys using Registry Editor change the configuration that a particular value controls.
The registry is constantly referenced by Windows and other programs. When you make changes to nearly any setting, changes are also made to the appropriate areas in the registry, though these changes are sometimes not realized until you reboot the computer. Windows Registry backup files are saved as REG files.

Event Log -  Event log stores events related to the users of that operating system like when user logged in or out in the system, which program were frequently used, when user performed system changes, application specific events etc. Event log information because it provides lots of useful user specific information about the access of system. This event log information files have headers for the particular file and headers for the particular entries and both have the unique identifier (signature) “LfLe” included in their structure. These structures are all well-known and it is not difficult to write tools that parse the event records that these logs contain in a binary form and also extract them from the unallocated space. Parsing a binary form is valuable because the header clusters of the event log files may output a number of event records in the particular file, whereas if you parse it in a binary form extra event records may be produced. The Event Log file extension is “.evt.”
An open source tool can be used to extract information, like "evtparse.pl", to parse the information from the relevant .evt files. Evtparse.pl simply extracts the data and outputs the event record information, while evtrtp.pl not only produces the event record data but also scans this data and outputs information concerning the regularity of different SIDs, sources for the event records, and the data range of all entries located in the file as well (statistics). Such information comes in handy when an analyst is searching for a bustle that happened on the machine at a given time. For instance, if an investigator parses an event log in search of a particular event ID or a specific event, he/she can see whether it is present within the file or whether the date range of the accessible event entries includes the exposed window or whether events of interest exist within the given time frame when the incident occurred and can save himself/herself a substantial amount of time by moving to a different source of data if the search brings no results.
The latest editions of Windows replaces the event logging mechanism of the previous Windows versions, such as Windows NT, 2000, XP, and 2003. The Windows event log mechanism is much more complicated;

LINK files - Have you notices or created Shortcuts files on your system. Yes, shortcuts files are created when a user or the operating system creates shortcut files for the files which are frequently used, double clicked or accessed from system drives such as attached storage. Such kinds of shortcut files are called link files they provided a link to original file. By accessing these link files, an investigator can find the activity of window such as the time and location from where these files have been accessed.

All these artifacts can be accessed manually by forensic experts or through various programming code and through specially designed tools to extract relevant information.

Thanks


Related Solutions

Can the following PCs be migrated from a windows XP and windows 7 operating system to...
Can the following PCs be migrated from a windows XP and windows 7 operating system to a cloud-based operating system? Justify your answer explaining the steps required for the migration and the hardware requirements needed to upgrade. Explain why you have chosen a cloud-based operating system as compared to the Windows 10 operating system. 3500 Desktop PC’s (1GHZ CPU, 2GB RAM, 16GB HDD) 4500 Desktop PC’s (1.4GHZ CPU, 4GB RAM, 1TB HDD) 3000 Desktop PC’s (2.4GHZ CPU, 8 GB RAM,...
Study PC operating system such as windows and linux etc and mobile operating system such as...
Study PC operating system such as windows and linux etc and mobile operating system such as Android and iOS, find out whether there are functions and features that are provided in PC OS but not in mobile OS, and if there is any, analyze why these functions and features are not provided by these mobile OS. In your opinion for the future development will PC operating system and mobile operating system be the same or different? Give the details.
5. Microsoft Corporation decides how many packets of the new operating system (Windows Vista) it is...
5. Microsoft Corporation decides how many packets of the new operating system (Windows Vista) it is going to sell on the market. The research (fixed) costs associated with the development of the new system amounts to F = $1000. The variable costs of the packet is negligible C(y) = 0. Microsoft’s inverse demand for the new operating system is given by P (y) = 100 − y. • Assume that Microsoft cannot discriminate among its customers. Find geometrically and analytically...
Describe three different sources a router can use to put/maintain the information contained in the routing...
Describe three different sources a router can use to put/maintain the information contained in the routing table.
2. List the different types of electron carriers within the electron transport system. For every pair...
2. List the different types of electron carriers within the electron transport system. For every pair of electrons each complex transfers, determine how many protons are translocated.
Differences Between Linux and Windows Operating Systems Two key differences between a Linux operating system and...
Differences Between Linux and Windows Operating Systems Two key differences between a Linux operating system and a Windows operating system are the concepts of “mounting” and “drive” letters. Provide an example for each. Why is it important to plan disk partitioning before installing Linux? Discuss the advantages of disk partitioning. Also discuss what logical volume management (LVM) is and why or why you might use it.
Discuss why time stamps play an important part of digital forensics. List three different time stamp...
Discuss why time stamps play an important part of digital forensics. List three different time stamp examples and how they are measured. (For example: Unix Epoch - the number of seconds that elapsed from..)
Different levels of organization contained within any systemhave characteristics and properties found only at that...
Different levels of organization contained within any system have characteristics and properties found only at that level. Identify three properties exclusive to the population level of organization.please explain?
For most of its history Microsoft has produced a computer operating system (Windows) that it sold...
For most of its history Microsoft has produced a computer operating system (Windows) that it sold to other firms making personal computers. While it still does this, it now produces its own line of personal computers (Winbook pro) that use the Windows operating system. Use concepts developed in class and in the book this semester to discuss factors relevant to Microsoft’s decision to vertically integrate in this way.
Although 90% of all desktop computers use Windows as their operating system, there are two popular...
Although 90% of all desktop computers use Windows as their operating system, there are two popular alternatives - Apple's Mac OS and the Linux open-source operating system. In this assignment, you will investigate an operating system other than the one you usually use to see how it handles common operating system functions. Note: A popular Linux OS is Ubuntu (As an open-source operating system it is FREE). If you choose to test Linux you can use this link for easy...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT