File Analysis Chapter 5 – Harlan Carvey Event Logs File Metadata Event Logs Logging Events • • • • • Events Logging Events Event Log Format Event Record Structure Various Logs Usual Event Logs • Application • Log of application errors, warnings and information • Security • Dropped Packets, Successful Connections • Logon/Logoffs • System • Various device events Registry References - XP Windows 7 Location of logs Event Log Location - XP Event Log Location Vista, Win7 • C:Windows->System32->winevt->Logs Location of Event Logs App & System Logging • On by default • Log size is 512 KB by default • Written by the application Security Logging - XP • Not on by default • Log size is 512 KB by default • Control Panel Admin tools -> Local Security Policy Security Logging Windows 7 Log Viewer • Event Viewer • Control Panel -> Administrative Tools -> Event Viewer • Application, Security and System logs available • Event Properties • DTG of the event • Important for some timelines App Log System Log Security Log Success Security Log Failure Windows 7 Event Viewer • • • • Convenient and pretty Works only on live systems Does not work on a forensics image We have to parse the event logs Event Logs • Binary Structure • Header and a series of records • Event ID formats • http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/e vent.aspx?eventid=528 • Application logs are vendor specific • EventID.net is a good source for this info - $$$ • blogs.msdn.com/ericfiz/default.aspx • www.microsoft.com/technet/support/ee/ee_advanced.aspx Event Log Configuration XP • Held in registry keys Windows 7 Registry Viewer • Event message Event Log File Format XP only • Event Log Header – 12 DWORD values • Event Records – Variable length • Windows 7 & Vista • http://www.dfrws.org/2007/proceedings/p65-schuster.pdf • http://computer.forensikblog.de/files/talks/SANS_Summit_Vi sta_Event_Log.pdf Event Log Header Structure Offset Size Description 0 4 bytes Size of the record (Header = 0x30, Event = 0xF4) 4 4 bytes Magic number 0x4C 66 4C 65 = LfLe 16 4 bytes Offset within the .evt file of the oldest event record 20 4 bytes Offset within the .evt file of the next event record to be written 24 4 bytes ID of the next event record 28 4 bytes ID of the oldest event record 32 4 bytes Maximum size of the .evt file (from the registry) 40 4 bytes Retention time of event records (from the registry) 44 4 bytes Size of the record (repeat of the first DWORD) Event Record Structure Offset Size Description 0 4 bytes Size of the record (Header = 0x30, Event = 0xF4) 4 4 bytes Magic number 0x4C 66 4C 65 = LfLe 8 4 bytes Record Number 12 4 bytes Time Generated 16 4 bytes Time written 20 4 bytes Event ID – Locates message file/dll/exe 24 2 bytes Event type (0x01 = error, 0x10 = Failure, 0x08 – Success, 0x04 = Info, 0x02 = Warning 26 2 bytes Number of strings 28 2 bytes Event category 30 2 bytes Reserved flags 32 4 bytes Closing record number 36 4 bytes String offset 40 4 bytes Length of user SSID 44 4 bytes Offset to the user SID within this event record 48 4 bytes Data length; length of the binary data associated with this event record 52 4 bytes Offset to data Carvey’s Help • Best not to depend on the Window’s API to read the Event files • They can be corrupted • May miss the next to be over written • Provides summary stats • Provides output readable in Excel evtstats.exe Lots of events lsevt.exe Entry for each of the 2464 Event Records lsevt2.exe Entry for each of the 2464 Event Records Puts it into an Excel readable format lsevt –f event_file –c > save_file.csv Excel – Open .csv file Change Format Choose Delimited Identify Separators Harlan’s stuff is separated by semicolons. With Perl knowledge you could change it. Excel Manipulatible Information Other Logs • • • • • IE Browsing History Set Up XP Firewall Recycle Bin Shortcut Files IE Browsing History • • • • • • Index.dat files DiscoverPro NetAnalysis Index dat spy SuperWinSpy Be careful !!! NetAnalysis Set Up Logs • • • • Setuplog.txt Setupact.log SetupAPI.log Netsetup.log Setuplog.txt C:\WINDOWS Setupact.log C:\WINDOWS SetupAPI.log C:\WINDOWS NetSetup.log c:\Winodws\Debug Task Scheduler Log SchedLgU.txt Enabling Firewall Logging • Control Panel -> Security Center -> Windows Firewall -> Advanced • Follow your nose Firewall Log • C:\WINDOWS\pfirewall.log Recycle Bin • C:\RECYCLER • Each user gets his own folder • Use the user’s SID • Each has its own INFO2 file Recycle Bin recbin.exe INFO2 File Structure • Header • 16 bytes • Final 4 bytes (DWORD) is the size of each record 0x320 (little endian) = 800 bytes • Records • Record # at offset 264 within the record • Drive designator at offset 268 2 = C:\, 3=D:\, etc • File size in clusters at offset 280 Open INFO2 in WinHex • Very hard • File -> Open • • • • • • • Navigate to C:\RECYCLER Open it Select a SID file Open it. It may say you don’t have privileges Type \INFO2 Try again! Maybe INFO2 Record Size Record size 0x00320 = 80010 Size in clusters 0x0001 Drive indicator 0x0002 File Metadata MAC Times OS - OS Action From To Create time Modification time FAT to FAT Copy C:\ C:\ Updated Unchanged FAT to FAT Move C:\ C:\ Unchanged Unchanged FAT to NTFS Copy Updated Unchanged FAT to NTFS Move Unchanged Unchanged NTFS to NTFS Copy C:\ C:\ Updated Unchanged NTFS to NTFS Move C:\ C:\ Unchanged Unchanged Word Documents • • • • • • Document location Statistics Magic number Version and Language Last 10 authors MACPS times Modified, accessed, created, printed, saved MeargeStreams • • • • Insert a spreadsheet into a word document Call it .doc – you see the Word document Call it .xls – you see the spreadsheet All sorts of uses • Smuggling out forecasts • Sharing pictures on the corporate server PDF Files • Similar metadata as Word docs. • Easily accessed • File -> Properties Image Files exif Data Original Photo off of the camera After Photoshop manipulation Tweet Metadata ADS – Alternative Data Streams • Native to NTFS • Permits data file to contain scripts, or executable code • No NT native tools to detect them • Native tools to create and launch them