0% found this document useful (0 votes)
25 views29 pages

3 270423 Chap4

The document provides background information on the history and structure of the Windows registry. It describes how the registry evolved from simple text files in early versions of Windows to a complex hierarchical database in modern versions. It also explains the layout and purpose of the main root keys and subkeys that make up the registry.

Uploaded by

husnaqierah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views29 pages

3 270423 Chap4

The document provides background information on the history and structure of the Windows registry. It describes how the registry evolved from simple text files in early versions of Windows to a complex hierarchical database in modern versions. It also explains the layout and purpose of the main root keys and subkeys that make up the registry.

Uploaded by

husnaqierah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

REGISTRY

1
History of Registry

• The root of Microsoft operating system was MS-DOS, which was a


command line operating system.
• In the DOS age, there was no registry but two files designed to store
the configuration information: “config.sys ” and “ autoexec.bat”.
• “Config.sys” was used to load the device drivers and “autoexec.bat”
was used to store the configurations of running programs and other
environmental variables.
• When the first graphical interface operating system of Microsoft,
Windows 3.0, was released, these two files used in MS-DOS were
replaced by INI files.
• These files were used to store the configuration settings of the
computers.

2
History of Registry …

• In Windows 95, a hierarchical database named Registry was


introduced.
• Although the Registry of Windows 95/98 has the similar structure as
Windows XP/Vista/7, the amount of data in Windows XP/Vista/7 Registry
has grown tremendously.
• The Registry in Windows XP/Vista/7 has a more stable and complex
structure than Windows 98/95/2000. In addition, the structure of
Windows XP registry could be considered as the basis of modern
Windows Registry.
• Although Windows Vista/7 Registry has more content than Windows XP
registry, it has very similar structures, keys, subkeys, and values as
Windows XP registry.

3
How Registry look like?

FIGURE: HKEY_LOCAL_MACHINE (HKLM)


Root Key and its Subkey 4
How to edit Registry?
• Use Registry Editor (regedit.exe).

5
What is Registry made of?

• The Windows Registry Editor is divided into two panels,


the left one is key panel and the right one is value
panel.
• In the left panel, there are five root keys, (1)
HKEY_CLASSES_ROOT, (2) HKEY_CURRENT_USER,
(3) HKEY_LOCAL_MACHINE,
(4) HKEY_USERS, and (5) HKEY_CURRENT_CONFIG.
6
What is Registry
made of? …
• These root keys form the basic structure of Window
Registry.
• However, this structure is just a logical structure.
• Among these five root keys, only two root keys,
HKEY_LOCAL_MACHINE and HKEY_USERS, have
physical files or hives.
• These two keys are called master keys.
• The other three keys are derived keys since they are derived
from the two master keys and their subkeys, or, they only
offer symbolic links to the two master keys and their subkeys.

7
HKEY_LOCAL_MACHINE (HKLM)
• HKLM is the first master key.
• It contains all of the configuration settings of a computer.
• When a computer startups, the local machine settings will boot before the individual user settings.
• If we double-click this entry in Windows Registry Editor, five subkeys will be listed: HARDWARE,
SAM, SECURITY, SOFTWARE, and SYSTEM.
• The information contained by these subkeys are listed below:
– HARDWARE is used to store the information of hardware devices that a computer detects
when the computer starts up. So, the subkeys in HARDWARE are also created during the
booting process.
– SAM is the abbreviation of Security Account Manager which is a local security database.
Subkeys in SAM contain the setting data of users and work groups.
– SECURITY includes a local security database in SAM and a strict ACL is used to manage the
users who could access the database.
– SOFTWARE includes all of the configuration settings of programs. Information on the
programs is stored in a standard format: HKLM\Software\Vendor\Program\Version.
– SYSTEM contains the configuration settings of hardware drivers and services. The key path
is HKEY_LOCAL_MACHINE\SYSTEM\ControlSetXXX, where XXX is a three digital number
from 000.
8
HKEY_LOCAL_MACHINE (HKLM) …

9
HKEY_USERS (HKU)
• HKU is another master key.
• It contains all of the per-user settings such as current console user and other users who
logged on this computer before.
• Double-click this entry, we can see at least three kinds of subkeys listed: KEFAUTL, SID,
and SID_CLASS.
• SID is security identifier which refers to the current console.
• SID-CLASSES contains per user class registration and file association. Usually, we could see
S-1-5-18, S-1-5-19, and S-1-5-20, which represents Local System Account, Local Service
Account, and Network Service Account respectively.
• Unlike the above two keys, HKEY_CLASSES_ROOT (HKCR), HKEY_CURRENT_USER ( HKCU),
and HKEY_CURRENT_CONFIG (HKCC) are derived keys and they only link to the two
master keys and their subkeys.

10
HKEY_CLASSES_ROOT (HKCR)
• HKCR contains two keys:
– HKLM\SOFTWARE\Classes and
– HKCU\Software\Classes
• The first one refers to the default registration classes, and the second
one refers to per user registration classes and file associations.

11
HKEY_CURRENT_USER (HKCU)
• HKCU links to a subkey of HKU, HKU\SID.
• This key allows all of the Windows programs and applications to create, access, modify,
and store the information of current console user without determining which user is
logging in.
• Under the root key HKCU, there are also five subkeys: (1) Environment, (2) Identities,
(3) Network, (4) Software, and (5) Volatile Environment.
– Environment is about the environmental configurations.
– Identities are related to Outlook Express.
– Network contains settings to connect the mapped network drive.
– Software refers to the user application settings.
– Volatile Environment is used to define the environmental variables according to
different users who logon a computer.

12
HKEY_CURRENT_CONFIG (HKCC)
• HKCC is an image of the hardware configuration profiles.
• HKLM\SYSTEM\Current\ControlSet\Hardware\Current, is also a link to
HKLM\SYSTEM\ControlSet\Hardware Profiles\XXXX, where XXXX is a
four digital number from 0000.

13
REGISTRY
• A database for configuration file for Windows OS.
• The computer’s central nervous system
• Keep track of user and system configuration &
preferences
• Forensic view
– Can provide an abundance of potential evidence
– Many artifacts are kept in registry
• Search terms
• Running or installed program
• Web addresses
• Files that have been recently opened

14
REGISTRY-structure
• A tree structure (like directories)
• Looking at it require a tool that can
translate the info into something
that can be understood
• Major multipurpose forensic tools
– Encase
– FTK

15
REGISTRY-structure
• Case 1
– Stolen credit card
– Two suspects are arrested after a
controlled drop of merchandise ordered
from the internet
– Examination of the computer NTUSER.
DAT, Registry and protected storage
system provider info found a listing of
multiple other names, addresses, credit
card numbers that being used 16
REGISTRY-structure
• Case 2
– Police investigate child pornography case projected in a hotel
room. Two hard disk and one laptop. A guy claim his laptop
not been connected to the hard disks that contain
pornography picture
– Examiner wanted to determine whether the guy claim is true
• Whether the hard disks been connected to the laptop
• Search system registry file for entries in the USBStor key
• Listing for the xternal hardisks were found along with the hardware
serial numbers
– Next, to validate, the defendant external drives are connected
with a lab computer system (clean installation of windows)
• a write blocker was connected between the drives and the system to
prevent any changes or modifications
• The lab computer’s system registry file was the examined
– USBStor keys showed the same

17
REGISTRY-attribute
• DF can be used to answer many questions
– What terms were searched using Google?
– Did Guy A type those terms?
• However we can rarely put someone’s finger on the
keyboard when a particular artifact is created.
– Need to uncover other evidence
• Tracking back to a specific user account or identifying
the registered owner of the system is much easier
– A single PC has multiple user accounts set up
– Each account is assigned a unique number called a
security identity or SID
• Many actions on the computer can be tracked by a
specific SID
• SID can tie an account to some particular action or 18
REGISTRY-External drives
• One way thieves can easily smuggles data out of an
organization is using external storage devices
– External hard disk
– Thumb drives
• The device can be used to
– Steal information
– Store child pornography
• Examiners need to determine whether any such device
has been attached to a computer
– Fortunately, it can be determined by data contained
in the registry
– Registry records this information with a significant
amount of detail
• Tell both the vendor and the serial number 19
What are Hives?
• Hives are the physical files of the two master keys
(HKEY_LOCAL_MACHINE and HKEY_USERS) in
Windows Registry stored on hard drive.
• The tree format we view through Windows Registry
Editor, is a logical structure of the five root keys.
• If we use forensic tools to view the Windows
Registry in an offline environment or view the
Registry remotely, only the two master keys will be
listed.
• So, only the two master keys and their subkeys
have hives. The hives of HKLM’s subkeys are
stored at %SYSTEMROOT%System32\config,
and the hives of HKU’s subkeys are stored at 20
Discuss
• (C1: Knowledge) What is Registry?
• (C1: Knowledge) List the root keys for Windows Registry.
• (C2: Understanding) Explain how to edit Registry.
• (C4: Analysis) Differentiate between Root Keys and Master Keys?
• (C2: Understanding) What are Hives in Registry?

21
Discuss
• (C1: Knowledge) What is Registry?
ANS: A database for configuration file for Windows OS. Keep track of user
and system configuration & preferences.
• (C1: Knowledge) List the root keys for Windows Registry.
– ANS: There are 5: (1) HKEY_CLASSES_ROOT, (2) HKEY_CURRENT_USER,
(3) HKEY_LOCAL_MACHINE,
(4) HKEY_USERS, and (5) HKEY_CURRENT_CONFIG
• (C2: Understanding) Explain how to edit Registry.
– ANS: Use built in registry editor that comes with Windows, called Registry
Editor (regedit.exe).

22
Discuss
• (C4: Analysis) Differentiate between Root Keys and Master Keys?
ANS:
– (a) There are 5 Root Keys (1) HKEY_CLASSES_ROOT (HKCR), (2)
HKEY_CURRENT_USER (HKCU), (3) HKEY_LOCAL_MACHINE (HKLM),
(4) HKEY_USERS (HKU), and (5) HKEY_CURRENT_CONFIG (HKCG).
– (b) Only 2 of them are Master Keys namely HKLM and HKU. The
other three keys are derived keys since they are derived from the two
master keys and their subkeys, or, they only offer symbolic links to the
two master keys and their subkeys.

23
Discuss
• (C2: Understanding) What are Hives in Registry?
ANS:
*Hives are the physical files of the two master keys
(HKEY_LOCAL_MACHINE@HKLM and HKEY_USERS@HKU) in Windows
Registry stored on hard drive.
*The hives of HKLM’s subkeys are
stored at %SYSTEMROOT%\System32\config, and the hives of
HKU’s subkeys are stored at
%USERPFOFILE%.

24
PRINT SPOOLING

25
PRINT SPOOLING

• In some cases, suspect’s printing activities may be relevant


• If you notice, printing has a delay after the Print is clicked
– This delay indicate a process that called spooling
– Spooling temporarily stores the print job until it can be
printed at a time that is convenient for the printer
– During this procedure, Windows create a pair of
complementary files.
• EMF (Enhanced Meta File) an image of document to be printed
• Spool file contains information about the print job itself

26
PRINT SPOOLING: spool file
• One of each for every print job
• Tell things like
– (a) Printer name, (b) Computer name, (c) User account that
sent the job
• However, they are not stored permanently in the hard disk
– They are normally deleted automatically after the print job
is finished
– However, there are exception
• If occur some kind of problem & the document did not print
• The computer that is initiating the print job may be set up to retain a copy
– Spool & EMF can be used to directly connect targets to
their crimes
• Extortion letters
• Forged contract
• Stolen client list
• Maps to body dump sites
27
Discuss
• (C3: Application) Demonstrate how print spooling can
be used as evidence in a crime.

28
Discuss
• (C3: Application) Demonstrate how print spooling can be used as
evidence in a crime?
ANS: When some kind of problem & the document did not print, the
computer that is initiating the print job may be set up to retain a
copy. Spool & EMF can be used to directly connect targets to their
crimes e.g. (1) Extortion letters, (2) Forged contract, (3) Stolen client list,
(4) Maps to body dump sites.

29

You might also like