LESSON 7 - Windows File Systems
LESSON 7 - Windows File Systems
BY R. MWAURA
Objectives
• File system
– Gives OS a road map to data on a disk
• Type of file system an OS uses determines how
data is stored on the disk
• A file system is usually directly related to an OS
• When you need to access a suspect’s computer to
acquire or inspect data
– You should be familiar with the computer’s platform
Understanding the Boot Sequence
• Bootstrap process
– Contained in ROM, tells the computer how to
proceed
– Displays the key or keys you press to open the
CMOS setup screen
• CMOS should be modified to boot from a forensic
floppy disk or CD
Understanding the Boot Sequence
(continued)
Understanding Disk Drives
• Data streams
– Ways data can be appended to existing files
– Can obscure valuable evidentiary data, intentionally
or by coincidence
• In NTFS, a data stream becomes an additional file
attribute
– Allows the file to be associated with different
applications
• You can only tell whether a file has a data stream
attached by examining that file’s MFT entry
NTFS Compressed Files
• Registry
– A database that stores hardware and software
configuration information, network connections, user
preferences, and setup information
• For investigative purposes, the Registry can
contain valuable evidence
• To view the Registry, you can use:
– Regedit (Registry Editor) program for Windows 9x
systems
– Regedt32 for Windows 2000 and XP
Exploring the Organization of the
Windows Registry
• Registry terminology:
– Registry
– Registry Editor
– HKEY
– Key
– Subkey
– Branch
– Value
– Default value
– Hives
Exploring the Organization of the
Windows Registry (continued)
Exploring the Organization of the
Windows Registry (continued)
Examining the Windows Registry
• Virtual machine
– Allows you to create a representation of another
computer on an existing physical computer
• A virtual machine is just a few files on your hard
drive
– Must allocate space to it
• A virtual machine recognizes components of the
physical machine it’s loaded on
– Virtual OS is limited by the physical machine’s OS
Understanding Virtual Machines
(continued)
• In computer forensics
– Virtual machines make it possible to restore a
suspect drive on your virtual machine
• And run nonstandard software the suspect might have
loaded
• From a network forensics standpoint, you need to
be aware of some potential issues, such as:
– A virtual machine used to attack another system or
network
Creating a Virtual Machine