Windows registry forensics advanced digital forensic analysis of the Windows registry

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition , provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of...

Descripción completa

Detalles Bibliográficos
Otros Autores: Carvey, Harlan A., author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Cambridge, MA. : Syngress [2016]
Edición:Second edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630765706719
Tabla de Contenidos:
  • Front Cover
  • WINDOWS REGISTRYFORENSICS
  • WINDOWS REGISTRY FORENSICS: Advanced Digital Forensic Analysis of the Windows Registry
  • Copyright
  • Dedication
  • CONTENTS
  • ABOUT THE AUTHOR
  • ABOUT THE TECHNICAL EDITOR
  • PREFACE
  • Intended Audience
  • Book Organization
  • Chapter 1: Registry Analysis
  • Chapter 2: Processes and Tools
  • Chapter 3: Analyzing the System Hives
  • Chapter 4: Case Studies: User Hives
  • Chapter 5: RegRipper
  • ACKNOWLEDGMENTS
  • 1 - REGISTRY ANALYSIS
  • Introduction
  • Core Analysis Concepts
  • Locard's Exchange Principle
  • Least Frequency of Occurrence
  • Windows Isn't Just "Windows"
  • Remnants
  • Goals
  • Documentation
  • Challenges of Registry Analysis
  • What Is the Windows Registry?
  • Purpose of the Windows Registry
  • Location of the Windows Registry on Disk
  • Where Else Can We Find Registry Data?
  • Nomenclature
  • Registry Structure
  • Registry Key Cells
  • Registry Value Cells
  • Summary
  • 2 - PROCESSES AND TOOLS
  • Introduction
  • Forensic Analysis
  • Viewing Registry Hives
  • RegEdit
  • Windows Registry Recovery
  • Registry Explorer
  • Pros and Cons
  • Parsers
  • Pros and Cons
  • RegRipper
  • Timeline Analysis
  • Differencing
  • Deleted Keys and Values
  • Memory
  • Summary
  • 3 - ANALYZING THE SYSTEM HIVES
  • Introduction
  • Artifact Categories
  • Security Hive
  • SAM Hive
  • Cracking User Passwords
  • System Hive
  • Finding the "Current" ControlSet
  • System Configuration Information
  • System Name
  • ClearPagefileAtShutdown
  • Network Interfaces
  • Routes
  • File System Settings
  • Prefetch Settings
  • AutoStart
  • Windows Services
  • Program Execution
  • AppCompatCache
  • Malware
  • USB Devices
  • Mapping Devices to Drive Letters
  • Software Hive
  • System Configuration Information
  • Windows Version
  • ProfileList
  • Network Cards
  • Wireless Connections
  • AutoStart
  • The Run Key.
  • The Notify Key
  • Image File Execution Options
  • AppInit_DLLs
  • Shell Extensions
  • Browser Helper Objects
  • Scheduled Tasks
  • AppCompatFlags
  • Program Execution
  • LANDesk
  • Malware
  • Audio Devices
  • AmCache Hive
  • Summary
  • 4 - CASE STUDIES: USER HIVES
  • Introduction
  • NTUSER.DAT
  • System Configuration Information
  • AutoStart
  • The Run Key
  • The RunOnce Key
  • Other AutoStart Locations
  • Program Execution
  • Applets
  • SysInternals
  • UserAssist
  • Application Compatibility Assistant
  • Terminal Server Client
  • Malware
  • File Access
  • RecentDocs
  • ComDlg32
  • Microsoft Office File/Place MRUs
  • TrustRecords
  • Adobe Reader
  • User Activity
  • TypedPaths
  • TypedURLS
  • Searches
  • File Associations
  • USRCLASS.DAT
  • AutoStart
  • Program Execution
  • File Access
  • Photos
  • Shellbags
  • Summary
  • 5 - REGRIPPER
  • Introduction
  • What Is RegRipper?
  • Plugins
  • Profiles
  • Getting the Most Out of RegRipper
  • Finding Out About Plugins
  • Creating New Plugins
  • Create Your Own Profiles
  • Extending RegRipper
  • What to Do When Something Goes Wrong
  • Summary
  • INDEX
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • K
  • L
  • M
  • N
  • O
  • P
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Z
  • Back Cover.