Book Image

Practical Windows Forensics

Book Image

Practical Windows Forensics

Overview of this book

Over the last few years, the wave of the cybercrime has risen rapidly. We have witnessed many major attacks on the governmental, military, financial, and media sectors. Tracking all these attacks and crimes requires a deep understanding of operating system operations, how to extract evident data from digital evidence, and the best usage of the digital forensic tools and techniques. Regardless of your level of experience in the field of information security in general, this book will fully introduce you to digital forensics. It will provide you with the knowledge needed to assemble different types of evidence effectively, and walk you through the various stages of the analysis process. We start by discussing the principles of the digital forensics process and move on to show you the approaches that are used to conduct analysis. We will then study various tools to perform live analysis, and go through different techniques to analyze volatile and non-volatile data.
Table of Contents (20 chapters)
Practical Windows Forensics
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Plaso architecture


Let's take a look at Plaso architecture. Plaso has a few core components which perform independent roles:

  • Preprocessing

  • Collection

  • Worker

  • Storage

Let's look at them in more detail.

Preprocessing

At this stage, some preprocessing tasks should be done prior to all other processing. For example, before mounting the image and determining which OS is installed on the disk, collect some information which will be used in the next stage.

The preprocessing process should collect the following:

  • The version of the OS

  • The hostname

  • Time zone information

  • Default applications, such as the default browser, and so on

  • Enumerate all users and their paths

Collection

In the collection stage, the process goes over the image, directory, or mount point, and finds all the files that the tool can process.

The collection could be divided into three different scenarios:

  • In the simplest case, the collection process recursively goes through either a mount point or an image file and collects every file discovered.

  • During...