Digital Forensics Midterm Exam Review: Key Artifacts

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/108

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

109 Terms

1
New cards

Prefetch Artifacts

Files created by Windows OS (%SystemRoot%\Prefetch) to speed up application startup process. Created when an application is run from a specific location for the first time.

2
New cards

Naming Convention

ExecutableName-HASH.pf (Hash relates to the execution path).

3
New cards

Forensic Value of Prefetch

Evidence of program execution (Executable name, path, run count).

4
New cards

Creation timestamp of .pf file

May indicate the first run time.

5
New cards

Last modification timestamp of .pf file

Indicates the last run time.

6
New cards

Windows 8+ Prefetch

Stores the last 7 run timestamps if run more than once.

7
New cards

Volume information in Prefetch

Includes path, creation timestamp, serial number.

8
New cards

Maximum Files in Prefetch

WinXP-7: 128; Win8-10: 1024.

9
New cards

Important Note on Prefetch

Disabled by default on Server OS and systems with SSDs.

10
New cards

Analysis Detail of Prefetch

Prefetch snapshot created ~10 seconds after execution. Captures library/file references.

11
New cards

Autopsy Tool

Use 'Recent Activity' ingest module. View results under Data Artifacts > Run Programs.

12
New cards

WinPrefetchView

Standalone utility to read .pf files directly from the system or extracted folder (C:\Windows\Prefetch) and display stored information.

13
New cards

Windows Search Artifacts

Desktop search platform (Vista+) indexing content, properties for files, email, etc.

14
New cards

Database File for Windows Search

Windows.edb.

15
New cards

Format of Windows Search Database

Extensible Storage Engine (ESE).

16
New cards

Location of Windows Search Database

C:\ProgramData\Microsoft\Search\Data\Applications\Windows\Windows.edb.

17
New cards

Forensic Value of Windows Search

Valuable source of evidence (files, images, videos, directories, Outlook data) indexed often without user awareness.

18
New cards

Tools for ESE

EseDbViewer, WinSearchDBAnalyzer.

19
New cards

Windows Store Artifacts

Relates to applications installed, managed, and uninstalled via the Microsoft Store (Windows 10).

20
New cards

Log Database for Windows Store

StateRepository-Machine.srd (SQLite format).

21
New cards

Location of Windows Store Log Database

%SystemDrive%\ProgramData\Microsoft\Windows\AppRepository\.

22
New cards

Forensic Value of Windows Store

Log of applications installed via the store and their updates.

23
New cards

Tools for Windows Store

SQLite database browser (e.g., DB Browser for SQLite).

24
New cards

ThumbCache Artifacts

Hidden system files storing thumbnail images of multimedia files for graphical view in Explorer (replaces legacy Thumbs.db).

25
New cards

Location of ThumbCache Artifacts

%SystemDrive%\Users\

26
New cards

Forensic Value

Graphical evidence of file existence and user viewing, even if the original file is deleted.

27
New cards

Forensic Value

Used by Law Enforcement to prove file presence.

28
New cards

Forensic Value

Contains metadata: Original file details, cache ID, header checksum, data offset/type/size, potentially timestamps (created, accessed, modified).

29
New cards

Volume Shadow Copies (VSCs)

Point-in-time copies of volumes created by Volume Shadow Copy Service (VSS). Introduced in WinXP (as System Restore Points), enhanced in Vista/7+.

30
New cards

Functionality of VSCs

Backs up critical system files, Registry hives (block-level clone).

31
New cards

Forensic Value of VSCs

Recover deleted files (if deleted after VSC creation); Understand user activity before an incident; Access previous versions of files; Retrieve historical system state (system files, registry hives).

32
New cards

Limitations of VSCs

Only captures state at the time of creation. Prior changes are lost.

33
New cards

Limitations of VSCs

Block-level cloning might miss minor file changes.

34
New cards

Limitations of VSCs

Service can be disabled by user/policy.

35
New cards

Limitations of VSCs

Disk space allocation limits can prevent saving or cause automatic overwriting.

36
New cards

Limitations of VSCs

Not guaranteed evidence source, but a valuable aid.

37
New cards

Tool for VSC Analysis

ShadowExplorer.

38
New cards

Purpose of ShadowExplorer

Allows browsing of VSCs created by Win Vista/7/8/10/11 VSS.

39
New cards

Use Case of ShadowExplorer

Especially useful for Windows Home editions (which lack built-in access) but helpful for all editions. Provides a GUI to navigate VSC contents.

40
New cards

Process for VSC Analysis

1. Mount forensic image (Tool: OFSMount).

41
New cards

Process for VSC Analysis

2. List available VSCs for the target drive (Command: vssadmin list shadows /for=:). Note the Shadow Copy Volume path (e.g., \?\GLOBALROOT\Device\HarddiskVolumeShadowCopyX).

42
New cards

Process for VSC Analysis

3. Create a local directory (e.g., D:\VSS\).

43
New cards

Process for VSC Analysis

4. Create a symbolic link from the local directory to the Shadow Copy Volume (Command: mklink /d ).

44
New cards

Process for VSC Analysis

5. Analyze the contents of the linked folder using forensic tools (Tool: FTK Imager, add evidence type 'Contents of a Folder').

45
New cards

Hibernation File

Stores a compressed copy of RAM contents when the system hibernates.

46
New cards

Location of Hibernation File

C:\hiberfil.sys (Root directory, hidden by default).

47
New cards

Forensic Value of Hibernation File

Preserves volatile data (RAM contents) that is lost on shutdown. Can reveal running processes, network connections, open applications/state, internet activity (visited sites, credentials), malware activity (even if removed later).

48
New cards

Page File

Swap file / virtual memory. Used by Windows to store RAM data when physical RAM is full.

49
New cards

Location of Page File

C:\pagefile.sys (Root directory, typically).

50
New cards

Forensic Value of Page File

Contains remnants of RAM data. Evidentiary information (applications, network traffic, malware remnants), visited websites/URLs, cleartext protocols (HTTP/FTP), indicators of compromise (IOCs). Valuable even if data is no longer in active RAM.

51
New cards

Tool for Examining Hibernation and Page File

bulk_extractor.

52
New cards

Functionality of bulk_extractor

Scans disk images or files without parsing file systems. Extracts information like email addresses, URLs, etc. Creates histograms of found features. Known for speed and thoroughness due to ignoring file system structure and parallel processing capability.

53
New cards

Task Scheduler

Windows job scheduler for running programs/scripts at predefined times/intervals.

54
New cards

Location of Task Scheduler

C:\Windows\Tasks OR C:\Windows\System32\Tasks (XML files).

55
New cards

Analysis of Task Scheduler

Extract and view XML files (e.g., using Notepad++).

56
New cards

Temporary Files

Files created by OS or applications (esp. graphics/media editors) to hold data temporarily. Often not deleted, leading to wasted space.

57
New cards

Typical Locations for Temporary Files

%systemdrive%\Windows\Temp, %userprofile%\AppData\Local\Temp.

58
New cards

Forensic Value of Temporary Files

Can contain remnants of data processed or user activity.

59
New cards

Jumplists

List of recent files accessed per application.

60
New cards

Location of Jumplists

C:\Users\{username}\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\

61
New cards

Naming Convention for Jumplists

{ApplicationID}.automaticDestinations-ms.

62
New cards

Forensic Value of Jumplists

Shows files accessed by specific applications. Created time = First access; Modified time = Last access.

63
New cards

Tool for Jumplists

JumplistExplorer.

64
New cards

Shortcut (LNK) Files

Files automatically created when a user opens, uses, or creates a file/folder. Links point to the target, its parent, and grandparent folders.

65
New cards

Locations for Shortcut Files (Win 7/8/10)

C:\Users\$USER$\AppData\Roaming\Microsoft\Windows\Recent\ and C:\Users\$USER$\AppData\Roaming\Microsoft\Office\Recent\ (Office specific)

66
New cards

Forensic Value of Shortcut Files

Evidence of file/folder access, usage, and existence.

67
New cards

Event Log Artifacts

Logs maintained by Windows recording system, application, and security events.

68
New cards

Locations for Old Event Logs

C:\Windows\System32\config\ (Files: SysEvent.evt, AppEvent.evt, SecEvent.evt). File extension: *.evt.

69
New cards

Locations for New Event Logs

C:\Windows\System32\winevt\Logs\ File extension: *.evtx.

70
New cards

Forensic Value of Event Logs

Tracking user access to files, successful/failed logins, application usage, audit policy changes, permission changes, system/driver issues, service start/stop.

71
New cards

Analysis Tool for Event Logs

Use Windows Event Viewer (built-in) or PsLogList. Filter by Event ID. Correlate timestamps (consider time zone differences).

72
New cards

Account Management Events

Record creation/modification of accounts (user, computer) and groups (security-enabled global, local, universal) on the system where the change occurred (local machine or DC).

73
New cards

Account Logon vs. Logon Events

Account Logon: Authentication process (verifying credentials). Occurs where the account authority resides (DC for domain, local system for local accounts). Logon: Access process (gaining access to a resource after authentication). Recorded on the system being accessed.

74
New cards

Successful Logon

Differentiates between interactive (local) and remote/network access. Provides account name and source host (IP/hostname) for remote logons.

75
New cards

Failed Logon

Indicates potential password guessing/spraying. Provides source host information. Failure reason codes give specifics.

76
New cards

User Logoff

Records session termination. Can be inconsistent. Logon ID links logon/logoff events. Helps estimate session duration for interactive logons.

77
New cards

Explicit Credentials Logon

Indicates use of alternate credentials (e.g., RunAs, UAC elevation).

78
New cards

Special Privileges Assigned

Indicates elevated access was granted to a session.

79
New cards

NTLM Authentication

Use of NTLM protocol. On non-DCs, often indicates local account usage, which can be suspicious in domain environments.

80
New cards

Session Reconnect/Disconnect

Relates to RDP sessions or Fast User Switching. Session Name field ('Console' vs. 'RDP') differentiates.

81
New cards

Browser Artifacts

Critical for understanding user internet activity, attack vectors, source of compromise.

82
New cards

Data Types

History (visited URLs, timestamps, visit count), Cache (downloaded images, scripts, docs), Cookies (session management, tracking), Typed URLs, Session data, Downloads, Form data (logins, searches), Favorites.

83
New cards

Internet Explorer (Legacy) Storage

index.dat files (various locations).

84
New cards

Internet Explorer (Modern) Storage

ESE Database (WebCacheV*.dat) in AppData\Local\Microsoft\Windows\WebCache\.

85
New cards

Chrome, Firefox, Safari, Opera Storage

Primarily SQLite databases. Check Freelist for deleted records.

86
New cards

Internet Explorer History Location

Users\$USER$\AppData\Local\Microsoft\Windows\History\ (Legacy); ...\WebCache\ (Modern).

87
New cards

Firefox History/Data Location

Users\$USER$\AppData\Roaming\Mozilla\Firefox\Profiles\.default\places.sqlite.

88
New cards

Chrome History/Data Location

Users\$USER$\AppData\Local\Google\Chrome\User Data\Default\History.

89
New cards

Internet Explorer Temp Files Location

Users\$USER$\AppData\Local\Microsoft\Windows\Temporary Internet Files\ (Legacy); ...\INetCache\ (Modern).

90
New cards

Browser Usage Artifact Categories

History, Cache, Cookies, Typed URLs, Sessions, Most visited sites, Screenshots (if applicable), Financial info, Form values (Searches, Autofill), Downloads, Favorites.

91
New cards

Email Artifacts

Common investigation area; contains personal/business communication.

92
New cards

Email Key Components

Headers, Text Body, Attachments. Also: flags, certificates, read receipts.

93
New cards

Windows Mail Location

Users\\AppData\Local\Comms\Unistore\data\3\.

94
New cards

Microsoft Outlook Location

Users\\AppData\Local\Microsoft\Outlook\ (stores .pst or .ost files).

95
New cards

Email Header Analysis

First step in email forensics. Detects spoofing/phishing. Reveals message path and metadata. Read Received: headers from bottom to top.

96
New cards

Informational Email Header Fields

From:, To:, Cc:, Bcc:, Date:, Subject:, Reply-To:, Content-Type:.

97
New cards

Technical Email Header Fields

Return-Path: (bounce address), Received: (servers/IPs message traversed, timestamps), Message-ID: (unique message identifier), MIME-Version:.

98
New cards

Security Email Header Fields

DKIM-Signature: (authenticity check via DNS), SPF: (checks if sending server is authorized via DNS), X- Headers (custom headers for spam filters, tracking, etc.).

99
New cards

Email Analysis Tools

Autopsy (Email Parser ingest module), MXToolbox Email Header Analyzer (online tool for parsing).

100
New cards

Windows Registry Definition

Central hierarchical database storing vital configuration data for OS, hardware, software, and user settings. Acts as a system log file.