In: Computer Science
Explain what a Windows Registry Shellbag is and how it can be used during a forensic investigation.
PART A) what a Windows Registry Shellbag :
In layman language we can say that windows registry shellbag is a kind of database which stores our all operating system's setting.We can perform various task and even can make our computer to run smoothly if we master the Windows registry settings.The task which we can perform from shellbag are :We can customize taskbar,system window, we can customize controlpanel and start menu we can handle windowupdate also we can troubleshoot various problems caused in our OS.
Generally, speaking ShellBags are designed to hold information
about user’s preferences while browsing folders. That means that if
the user changes folder view from “Large Icons” to, for example,
“Details”, the settings get stored in ShellBag.
When you open, close or change viewing option of any folder on your
computer, either from Windows Explorer, or from the Desktop (even
by right-clicking or renaming the folder), a ShellBag record is
created or updated. This implies the following:
PART B) : How it can be used during a forensic investigation:
Forensic Value (or Why It's Important)
We now know the basics of what Shellbags artifacts are...so how can
we use them to our advantage? Through them, we can determine the
following:
Why are Shellbags Important to Digital Forensics Investigations?
One might ask why the position, view, or size of a given folder window is important to forensic investigators. While these properties might not be overly valuable to an investigation, Windows creates a number of additional artifacts when storing these properties in the registry, giving the investigator great insight into the folder, browsing history of a suspect, as well as details for any folder that might no longer exist on a system (due to deletion, or being located on a removable device).
The Key Artifacts That Need to be Found When Investigating Shellbags
For Windows XP, shellbag artifacts are located in the NTUSER.dat registry hive at the following locations:
For Windows 7 and later, shellbags are also found in the UsrClass.dat hive:
The shellbags are structured in the BagMRU key in a similar format to the hierarchy to which they are accessed through Windows Explorer with each numbered folder representing a parent or child folder of the one previous. Within each of those folders are the MRUListEx, NodeSlot, and NodeSlots keys: