File | |
---|---|
eForensics Magazine 2018 01 Windows Registry and Log Analysis |
This eBook is only available for course participants and eForensics Magazine subscribers.
About the author: Luca Cadonici
Member of the International Information Systems Forensics Association (IISFA), Luca Cadonici graduated from the University of Pisa in 2010, moving closer to Computer Security and obtaining the European Qualification as an Expert in Service Management and Network Security – liv.4 EQF (European Qualification Framework). During his career, he has obtained several Computer Security and Computer forensics certifications (among others: CDFE, OSFCE, eNDP, eJPT, CompTIA Linux +, ITIL v3) and worked at the Intesa Sanpaolo Development and Security Office taking care of the activities related to the ISO27001 and PCI-DSS standards.
He lives in Italy and works as a forensic consultant for prosecutors, law enforcement agencies and law firms.
About this eBook
This eBook contains the reading material from the course “Windows Registry and Log Analysis”, available on eForensics Magazine’s website. It does not contain the whole course content - we skipped on several appendices, videos, and exercises. If you’re interested in these, or in getting a certificate proving what you have learned with this eBook, consider joining the course (eBook is included in the course materials).
Table of Contents
Introduction
- About the course
- Setting up the lab
- References
Chapter 1: Keeping track of it all - the Windows Event Logging
- An introduction to Windows Logging
- The EVTX files
- Live Acquisition: wevtutil
- Post-mortem acquisition: FTK Imager
- Getting started with PowerShell
- Using PowerShell for log analysis
- Useful logs in computer forensics
- Logs from different channels
Chapter 2: At the heart of Windows OS - the Registry
- An introduction to Windows registry
- How the Registry works - keys and values
- The hives
- Windows Registry extraction with FTK Imager
- Parsing the Registry with FTK Imager
- Registry parsing with PowerShell - Get-ChildItem and Get-ItemProperty cmdlet
Chapter 3: Taking advantage of the Windows Registry
- Registry analysis with Registry ViewerMachine and operating system
- USB devices
- Users
- Applications
- Network
Chapter 4: Tracking user activities - combining information from logs and Registry
- Combining PowerShell with LogParser
- Tracking remote desktop sessions
- Tracking network connections
- A practical example: unauthorized access from a corporate network
File | |
---|---|
eForensics Magazine 2018 01 Windows Registry and Log Analysis |