encryptionwin7配置
win7配置 时间:2021-03-27 阅读:(
)
MicrosoftNetworkSecurityWindows7:CurrentEventsintheWorldofWindowsForensicsTroyLarsonSeniorForensicProgramManagerNetworkSecurity,MicrosoftCorp.
MicrosoftNetworkSecurityWhereAreWeNowVista&Windows2008–BitLocker.
–Format-Wipesthevolume.
–EXFAT.
–EventLogging—format,system,scheme.
–VirtualFolders&Registry.
–VolumeShadowCopy.
–Links,HardandSymbolic.
–ChangeJournal.
–RecycleBin.
–Superfetch.
MicrosoftNetworkSecurityWhereAreWeNowWindows7&Window2008R2–UpdatedBitLocker.
–BitLockerToGo.
–VHDs—Bootfrom,mountas"Disks.
"–XPMode.
–FlashMediaEnhancements.
–Libraries,StickyNotes,JumpLists.
–ServiceandDrivertriggers.
–I.
E.
8,InPrivateBrowsing,TabandSessionRecovery.
–EvenmoreVolumeShadowCopy.
MicrosoftNetworkSecurityDigitalForensicsSubjectMatterExpertise"Stack"ThankstoEoghanCasey.
FileSystemsNTFS,FAT32,EXFATFvevol.
sysMount,Partition&VolumeManagersApplications—e.
g.
,I.
E.
,etc.
OSArtifacts"Disk"MicrosoftNetworkSecurityWindows7"Disk"Notedisksignature:2E1400320x1b8-1bbMicrosoftNetworkSecurityWindows7"Disk"HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0Diskpart>AutomountscrubMicrosoftNetworkSecurityVista"Disk"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\STORAGE\Volume\1&19f7e59c&0&Signature2E140032Offset100000Length114FD00000MicrosoftNetworkSecurityPartitionsandVolumesFileSystemsNTFS,FAT32,EXFATFvevol.
sysMount,Partition&VolumeManagersApplications—e.
g.
,I.
E.
,etc.
OSArtifacts"Disk"VirtualHardDrivesCreateAttachDetachDeleteMicrosoftNetworkSecurityBitLocker:Windows7Duringinstalling,Windows7createsa"SystemReserved"volume—enablingsetupofBitLocker.
InVista,theSystemvolumewasgenerally1.
5GBormore.
MicrosoftNetworkSecurityBitLocker:VistaPhysicallevelviewoftheheaderofthebootsectorofaVistaBitLockerprotectedvolume:–0xEB52902D4656452D46532D–R-FVE-FS-MicrosoftNetworkSecurityBitLocker:Windows7PhysicallevelviewoftheheaderofthebootsectorofaWindows7BitLockerprotectedvolume:–0xEB58902D4656452D46532D–X-FVE-FS-MicrosoftNetworkSecurityBitLocker:Windows7Vista&Windows2008cannotunlockBitLockervolumescreatedwithWindows7or2008R2.
ForensicstoolsmaynotrecognizethenewBitLockervolumeheader.
MustuseWindows7or2008R2toopen(andimage)BitLockervolumesfromWindows7or2008R2.
MicrosoftNetworkSecurityBitLockerRevieworImagingFileSystemDriverFvevol.
sysVolumeManagerApplicationUserModeKernelModeFVEVOL.
SYSsitsunderneaththefilesystemdriverandperformsallencryption/decryption.
Oncebooted,Windows(andtheuser)seesnodifferenceinexperience.
Theencryption/decryptionhappensatbelowthefilesystem.
MicrosoftNetworkSecurityBitLockerRevieworImagingFileSystemDriverFvevol.
sysVolumeManagerApplicationUserModeKernelModeMicrosoftNetworkSecurityBitLockerRevieworImagingThe"More/Lessinformation"buttonwillprovidetheBitLockervolumerecoverykeyidentification.
MicrosoftNetworkSecurityBitLockerRevieworImagingBitLockerRecoveryKey783F5FF9-18D4-4C64-AD4A-CD3075CB8335.
txt:BitLockerDriveEncryptionRecoveryKeyTherecoverykeyisusedtorecoverthedataonaBitLockerprotecteddrive.
Toverifythatthisisthecorrectrecoverykeycomparetheidentificationwithwhatispresentedontherecoveryscreen.
Recoverykeyidentification:783F5FF9-18D4-4CFullrecoverykeyidentification:783F5FF9-18D4-4C64-AD4A-CD3075CB8335BitLockerRecoveryKey:528748-036938-506726-199056-621005-314512-037290-524293MicrosoftNetworkSecurityBitLockerRevieworImagingEntertherecoverykeyexactly.
MicrosoftNetworkSecurityBitLockerRevieworImagingViewedorimagedaspartofaphysicaldisk,BitLockervolumesappearencrypted.
MicrosoftNetworkSecurityBitLockerRevieworImagingToviewaBitLockervolumeasitappearsinitsunlockedstate,addressitasalogicalvolume.
MicrosoftNetworkSecurityBitLockerRevieworImagingMicrosoftNetworkSecurityFileSystemsFileSystemsNTFS,FAT32,EXFATFvevol.
sysMount,Partition&VolumeManagersApplications—e.
g.
,I.
E.
,etc.
OSArtifacts"Disk"MicrosoftNetworkSecurityFileSystemsSinceVistaSP1,Formatwipeswhileitformats.
http://support.
microsoft.
com/kb/941961Diskpart.
exe>CleanallMicrosoftNetworkSecurityFileSystems-Vista&Windows7NTFS–Symboliclinkstofiles,folders,andUNCpaths.
Bewarethe"ApplicationData"recursionloop.
Cf.
Linkfiles.
–Hardlinksareextensivelyused(\Winsxs).
–Disabledbydefault:UpdateLastAccessDate.
–Enabledbydefault:TheNTFSChangeJournal($USN:$J).
TransactionalNTFS($Tops:$T).
MicrosoftNetworkSecurityFileSystems-Vista&Windows7ThevolumeheaderofanEXFATvolume.
DoyourforensicstoolsreadEXFATMicrosoftNetworkSecurityOSArtifactsFileSystemsNTFS,FAT32,EXFATFvevol.
sysMount,Partition&VolumeManagersApplications—e.
g.
,I.
E.
,etc.
OSArtifacts"Disk"MicrosoftNetworkSecurityOSArtifacts—Recycle.
Bin[Volume]:\$Recycle.
Bin–$Recycle.
BinisvisibleinExplorer(viewhiddenfiles).
–PeruserstoreinasubfoldernamedwithaccountSID.
–NomoreInfo2files.
–Whenafileisdeleted—movedtotheRecycleBin—itgeneratestwofilesintheRecycleBin.
–$Iand$Rfiles.
$Ior$Rfollowedbyseveralrandomcharacters,thenoriginalextension.
Therandomcharactersarethesameforeach$I/$Rpair.
$Ifilemaintainstheoriginalnameandpath,aswellasthedeleteddate.
$Rfileretainstheoriginalfiledatastreamandotherattributes.
Thenameattributeischangedto$R******.
ext.
MicrosoftNetworkSecurityOSArtifacts—Recycle.
BinNotethedeleteddate(inblue).
MicrosoftNetworkSecurityOSArtifacts—Recycle.
BinMicrosoftNetworkSecurityOSArtifacts—FolderVirtualization–PartofUserAccessControl—Standardusercannotwritetocertainprotectedfolders.
C:\WindowsC:\ProgramFilesC:\ProgramData–Toallowstandardusertofunction,anywritestoprotectedfoldersare"virtualized"andwrittentoC:\Users\[user]\AppData\Local\VirtualStoreMicrosoftNetworkSecurityOSArtifacts—RegistryVirtualizationVirtualize(HKEY_LOCAL_MACHINE\SOFTWARE)Non-administratorwritesareredirectto:HKEY_CURRENT_USER\Software\Classes\VirtualStore\MACHINE\SOFTWARE\Keysexcludedfromvirtualization–HKEY_LOCAL_MACHINE\Software\Classes–HKEY_LOCAL_MACHINE\Software\Microsoft\Windows–HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNTMicrosoftNetworkSecurityOSArtifacts—RegistryVirtualizationLocationoftheregistryhivefilefortheVirtualStore–IsNOTtheuser'sNTUSER.
DAT–Itisstoredintheuser'sUsrClass.
dat\Users\[user]\AppData\Local\Microsoft\Windows\UsrClass.
datInvestigationofVista-Windows2008R2requirestheinvestigatortoexamineatleasttwoaccountspecificregistryhivefilesforeachuseraccount.
–NTUSER.
DAT–UsrClass.
datMicrosoftNetworkSecurityOSArtifacts—LibrariesMicrosoftNetworkSecurityOSArtifacts—Libraries\Users\[account]\AppData\Roaming\Microsoft\Windows\Libraries.
MicrosoftNetworkSecurityOSArtifacts—LibrariesLibrariesareXMLfiles.
MicrosoftNetworkSecurityOSArtifacts—LibrariesMicrosoftNetworkSecurityOSArtifacts—ShellThe"Recent"foldercontainslinkfilesandtwosubfoldersat\User\[Account]\AppData\Roaming\Microsoft\Windows\Recent.
MicrosoftNetworkSecurityOSArtifacts—ShellMicrosoftNetworkSecurityOSArtifacts—Shell"AutomaticDestination"filesareintheStructuredStoragefileformat.
MicrosoftNetworkSecurityOSArtifacts—ShellMicrosoftNetworkSecurityOSArtifacts—ShellMicrosoftNetworkSecurityOSArtifacts—ChkdskLogs\SystemVolumeInformation\ChkdskMicrosoftNetworkSecurityOSArtifacts—Superfetch\Windows\PrefetchMicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyVolumeshadowcopiesarebitleveldifferentialbackupsofavolume.
–16KBblocks.
–Copyonwrite.
–VolumeShadowcopy"files"are"difference"files.
TheshadowcopyserviceisenabledbydefaultonVistaandWindows7,butnotonWindows2008or2008R2.
"Differencefiles"resideintheSystemVolumeInformationfolder.
MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyShadowcopiesarethesourcedataforRestorePointsandtheRestorePreviousVersionsfeatures.
Usedinbackupoperations.
Shadowcopiesprovidea"snapshot"ofavolumeataparticulartime.
Shadowcopiescanshowhowfileshavebeenaltered.
Shadowcopiescanretaindatathathaslaterbeendeleted,wiped,orencrypted.
MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyVolumeshadowcopiesdonotcontainacompleteimageofeverythingthatwasonthevolumeatthetimetheshadowcopywasmade.
MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyTheVolumeShadowCopydifferencefilesaremaintainedin"\SystemVolumeInformation"alongwithotherVSSdatafiles,includinganewregistryhive.
MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopy\SystemVolumeInformation\Syscache.
hveMicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyMicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyMicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyvssadminlistshadows/for=[volume]:MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyMicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyShadowcopiescanbeexposedthroughsymboliclinks.
Mklink/dC:\{test-shadow}\\\GLOBALROOT\Device\HarddiskVolumeShadowCopy3\MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyVolumeShadowscanbemounteddirectlyasnetworkshares.
netsharetestshadow=\\.
\HarddiskVolumeShadowCopy11\MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopy>psexec\\[computername]vssadminlistshadows/for=C:>psexec\\[computername]netsharetestshadow=\\.
\HarddiskVolumeShadowCopy20\PsExecv1.
94-Executeprocessesremotely.
.
.
testshadowwassharedsuccessfully.
netexitedon[computername]witherrorcode0.
>robocopy/S/R:1/W:1/LOG:D:\VSStestcopylog.
txt\\[computername]\testshadowD:\vssTestLogFile:D:\VSStestcopylog.
txt.
.
.
MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyOtherwaystocallshadowcopies:–\\localhost\C$\Users\troyla\Downloads(Yesterday,July20,2009,12:00AM)–\\localhost\C$\@GMT-2009.
07.
17-08.
45.
26\–MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyC:\Users\Troyla\Desktop\fau-1.
3.
0.
2390a\fau\FAU.
x64>ddif=\\.
\HarddiskVolumeShadowCopy11of=E:\shadow11.
dd–localwrtTheVistaFirewallFirewallisactivewithexceptions.
Copying\\.
\HarddiskVolumeShadowCopy11toE:\shadow11.
ddOutput:E:\shadow11.
dd136256155648bytes129943+1recordsin129943+1recordsout136256155648byteswrittenSucceeded!
C:\Users\Troyla\Desktop\fau-1.
3.
0.
2390a\fau\FAU.
x64>Shadowcopiescanbeimaged.
MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyImagesofshadowcopiescanbeopenedinforensicstoolsandappearaslogicalvolumes.
MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyDatathathasbeendeletedcanbecapturedbyshadowcopiesandavailableforretrievalinshadowcopyimages.
MicrosoftNetworkSecurityOSArtifacts—VolumeShadowCopyEveryshadowcopydatasetshouldapproximatethesizeoftheoriginalvolume.
Amountofcasedata=(numberofshadowcopies)x(sizeofthevolume)+(sizeofthevolume).
10shadowcopies=692GBMicrosoftNetworkSecurityApplications—I.
E.
8FileSystemsNTFS,FAT32,EXFATFvevol.
sysMount,Partition&VolumeManagersApplications—e.
g.
,I.
E.
,etc.
OSArtifacts"Disk"MicrosoftNetworkSecurityApplications—I.
E.
8"C:\ProgramFiles(x86)\InternetExplorer\iexplore.
exe"-privateMicrosoftNetworkSecurityApplications—I.
E.
8Cachedataappearstobewritten,thendeleted.
MicrosoftNetworkSecurityApplications—I.
E.
8ResidualcachefilesfromInPrivatebrowsing.
MicrosoftNetworkSecurityApplications—I.
E.
8Tabandsessionrecovery—anewsourceforhistoricalbrowsinginformation.
\User\[Account]\AppData\Local\Microsoft\InternetExplorer\RecoveryMicrosoftNetworkSecurityApplications—I.
E.
8Recoveryfile:NotetheStructuredStoragefileformat.
MicrosoftNetworkSecurityApplications—I.
E.
8MicrosoftNetworkSecurity2009MicrosoftCorporation.
Allrightsreserved.
Microsoft,Windows,WindowsVistaandotherproductnamesareormayberegisteredtrademarksand/ortrademarksintheU.
S.
and/orothercountries.
TheinformationhereinisforinformationalpurposesonlyandrepresentsthecurrentviewofMicrosoftCorporationasofthedateofthispresentation.
BecauseMicrosoftmustrespondtochangingmarketconditions,itshouldnotbeinterpretedtobeacommitmentonthepartofMicrosoft,andMicrosoftcannotguaranteetheaccuracyofanyinformationprovidedafterthedateofthispresentation.
MICROSOFTMAKESNOWARRANTIES,EXPRESS,IMPLIEDORSTATUTORY,ASTOTHEINFORMATIONINTHISPRESENTATION.
厦门靠谱云股份有限公司 双十一到了,站长我就给介绍一家折扣力度名列前茅的云厂商——萤光云。1H2G2M的高防50G云服务器,依照他们的规则叠加优惠,可以做到12元/月。更大配置和带宽的价格,也在一般云厂商中脱颖而出,性价比超高。官网:www.lightnode.cn叠加优惠:全区季付55折+满100-50各个配置价格表:地域配置双十一优惠价说明福州(带50G防御)/上海/北京1H2G2M12元/月...
昔日数据怎么样?昔日数据是一个来自国内服务器销售商,成立于2020年底,主要销售国内海外云服务器,目前有国内湖北十堰云服务器和香港hkbn云服务器 采用KVM虚拟化技术构架,湖北十堰机房10M带宽月付19元起;香港HKBN,月付12元起; 此次夏日活动全部首月5折促销,有需要的可以关注一下。点击进入:昔日数据官方网站地址昔日数据优惠码:优惠码: XR2021 全场通用(活动持续半个月 2021/7...
IMIDC发布了6.18大促销活动,针对香港、台湾、日本和莫斯科独立服务器提供特别优惠价格最低月付30美元起。IMIDC名为彩虹数据(Rainbow Cloud),是一家香港本土运营商,全线产品自营,自有IP网络资源等,提供的产品包括VPS主机、独立服务器、站群独立服务器等,数据中心区域包括香港、日本、台湾、美国和南非等地机房,CN2网络直连到中国大陆。香港服务器 $39/...
win7配置为你推荐
广东GDP破10万亿__年,我国国内生产总值(GDP)首破10万亿元.目前,我国经济总量排名世界第___位?原代码什么是原代码www.bbb336.comwww.zzfyx.com大家感觉这个网站咋样,给俺看看呀。多提意见哦。哈哈。www.7788dy.com回家的诱惑 哪个网站更新的最快啊se95se.comwww.sea8.com这个网站是用什么做的 需要多少钱lcoc.top服装英语中double topstitches什么意思朴容熙给我介绍几个韩国 ulzzang 最好是像柳惠珠那样的 不要出道的...www.jsjtxx.com怎样让电脑安全又高速盗车飞侠侠盗飞车车子下水秘籍bihaiyinsha碧海银沙中国十大网页?
动态域名解析 全球付 网通服务器ip 徐正曦 服务器监测 如何注册阿里云邮箱 银盘服务 大化网 七牛云存储 广州服务器托管 上海联通 蓝队云 美国asp空间 百度新闻源申请 此网页包含的内容将不使用安全的https 阿里云宕机故障 瓦工招聘 ddos攻击器 kosskeb4 文件服务器硬件配置 更多