간략한 아티팩트 정리. 빠진것도 있음.
Digital Forensics and Windows-The Windows Artifacts
Some of the artifacts of Windows 7 operating system include:
- Root user Folder
- Pinned files
- Recycle Bin Artifacts
- Registry Artifacts
- App Data Artifacts
- Favorites Artifacts
- Send to Artifacts
- Swap Files Artifacts
- Thumb Cache artifacts
- HKey Class Root Artifacts
- Cookies Artifacts
- Program files Artifacts
- Meta Data Artifacts
- My Documents Artifacts
- Recent Folder Artifacts
- Restore Points Artifacts
- Print Spooler Artifacts
- Logo Artifacts
- Start menu Artifacts
- Jump lists
Information collected from any of these artifacts can be used to recreate the account history of a user. To gain a better understanding of how these artifacts can be used to access or retrieve valuable information, it is essential to briefly discuss some of the most important Artifacts of Windows 7.
1. Root User Folder artifacts
The Root User Folder gives access to the complete operating system. The Root User reserves the right to delete and modify files on the operating system besides having the rights to generate new users and award them some rights. Nonetheless, these rights cannot exceed the rights of a root user.
The Windows Folder is specified by %SYSTEMROOT%. The Folder can be accessed through Start\Run\%SYSTEMROOT%\System32.
2. Desktop Artifacts
All the files present on the desktop of a user are stored in the desktop folder of the operating system. Typically, the desktop is populated either,
- By the user, or
- By programs that automatically create files and place them on the desktop.
The Desktop can be accessed using the following link;
3. Pinned Files/Jump Lists Artifacts
Pinned Files or Jump lists is a relatively new feature introduced in Windows 7 released by Microsoft. Using the Jump lists all the pinned files can be accessed. Additionally, these lists also maintain a record of recently or last visited files relative to a particular software. Pinned files can be accessed from the jump list using the following link,
4. Recycle Bin Artifacts
The Recycle Bin stores the recently deleted files temporarily. These files can be restored easily. You can only view the Recycle Folder after un-checking the hide\protect system files option using the following link;
5. Registry Artifacts
Registry is the location where the configuration information of Windows is kept and stored. It can be used to obtain information related to historical and current use of applications in addition to obtaining valuable pieces of information about option preferences and system settings. It can be accessed using the following link;
6. App Data Artifacts
Application data or App data is a junction designed to provide backward compatibility. A junction can roughly be defined as a shortcut that serves to redirect programs and files to different locations. All the information related to settings configuration (of various apps) is stored in this folder. Furthermore, information related to the Windows address book and recently accessed files are also stored in this folder. The junction can be accessed through:
C: User\ (username)\AppData\Roamingfolder
7. Favorite Artifacts
The folder contains valuable bits of information related to Windows Explorer and Internet Explorer favorites. The folder can be accessed using the following link;
8. Send To Artifacts
The Send to folder stores information pertaining to shortcuts to different locations, and other software apps on the operating system of your computer. These shortcuts serve as destination points. Using these destination points a file can be sent or activated. Furthermore, these points can also be modified as per your convenience. The Send to folder can be accessed using the following link;
9. Swap Files Artifacts
Page Files or Swap files are the memory files of your computer that aid in expanding the memory of your computer. These files are not visible and are hidden by default settings. To view these files, following link can be used;
MyComputer>Properties>Taskmenu>AdvancedSystemSettings>Advancedtab>Performance>Settings>Performance options dialogue box>Advanced tab>Change.
10. Thumbs Cache Artifacts
Thumbs.db files are files that are stored in every directory on the Windows systems that includes thumbnails. These are default files (created by default) and store valuable information that is not available elsewhere. The file is created locally amongst the images. The location where cache is stored is as follows;
The display can be stopped by a user by checking on the ‘Always show icon, not thumbnails’ from the list of Folder options.
11. HKey Class Root Artifacts
The HKey Class Root or simply HKCR key contains sensitive information about different file name extensions in addition to containing information related to COM class registration. Furthermore, it is designed to be compatible with the 16-bit Window registry.
HKEY _LOCAL_MACHINE and HKEY_CURRENT_USER key both store valuables information related to file name extensions and class registration.
HKEY_LOCAL_MACHINE\Software\Classes: This key stores all the information pertaining to different users using the system.
The HKEY_CURRENT_USER\Software\Classes: On the other hand, this key stores information pertaining to the interactive user.
12. Cookies Artifacts
A number of website store information on your computer in the form of cookies. Cookies can roughly be defined as small text files containing information related to preferences and configuration of a particular user.
These files can be accessed using the following link;
C: User\(username)\AppData\Roaming folder\ Microsoft\Windows\Cookies.
13. Program Files Artifacts
Windows 7 consists of two Program files folders including;
1. C:\program files
2. C:\Program files (x86)
These folders are designed to be compatible for 32 bits and 64 bits version of Windows 7. The first one is compatible with the 64 bit version of Windows 7, whereas, the second one is compatible with 32 bit version of Windows 7.
14. Meta Data Artifacts
Meta Data simply refers to information related to data itself. Using the metadata artifacts, valuable strings of file information can be obtained that can be used as evidence in digital forensic investigation.
15. Restore Points Artifacts
Windows & gives its users the option of restoring points thereby creating the image of your system. This essentially helps in providing users with an option to revert back to the point when the system was working perfectly in case of fatal system errors. This system image also contains the drives that are required by your operating system to run in addition to including program settings, system settings and file settings.
16. My Documents Artifacts
My Documents contains all the information related to files that have been created by users themselves. Usually when a program is installed on a system, the information is stored in this folder. It is also known as the primary storage space meant for storing all the key information. The folder can be accessed through;
17. Start Menu Artifacts
The traditional Start menu has been replaced by Start in Windows 7. Using software like classic shell, it is absolutely possible to get the menu back. In Windows 7, the right column of the start (new version of start menu), links to respective libraries are shown instead of folders.
18. Logo Artifacts
The Logos included in the Windows 7 Operating System include valuable information pertaining to application events information, security related events information, setup event information, forwarded event information, and application events information.
19. Print Spooler Artifacts
Print Spooler is a software program responsible for organizing all the print jobs that have been sent to the print server or the computer printer. In essence all the print related information is stored in this folder.
The folder can be accessed by using the following link;
20. Recent Folder Artifacts
The Recent Folder stores links of the recently accessed or opened files by a specific user. The folder can be accessed by using the following link;
Windows Forensics- Analysis of Windows Artifacts
Analysis of Windows artifacts is the perhaps the most crucial and important step of the investigation process that requires attention to detail.
The following flowchart depicts a typical windows artifact analysis for the collection of evidence.