Live | offline | Tool |
---|---|---|
HKEY_LOCAL_MACHINE/SYSTEM | C:\Windows\System32\config\SYSTEM | Registry Explorer/regrip |
HKEY_LOCAL_MACHINE/SOFTWARE | C:\Windows\System32\config\SOFTWARE | Registry Explorer/regrip |
HKEY_USERS | C:\Windows\System32\config\SAM | Registry Explorer/regrip |
HKEY_CURRENT_USER | C:\Users<USER>\NTUSER.dat C:\Users<user>\Local Settings\Application Data\Microsoft\Windows\UsrClass.dat |
Registry Explorer/regrip |
Amcache.hve | C:\Windows\appcompat\Programs\Amcache.hve | RegistryExplorer/regrip |
Event viewer -> Windows Logs -> SECURITY | C:\Windows\winevt\Logs\Security.evtx | Event logs Explorer |
Event viewer -> Windows Logs -> SYSTEM | C:\Windows\winevt\Logs\SYSTEM.evtx | Event logs Explorer |
Event viewer -> Windows Logs -> Application | C:\Windows\winevt\Logs\Application.evtx | Event logs Explorer |
Event viewer -> Applications & service logs -> Microsoft -> Windows -> TaskScheduler -> Operational | Microsoft-Windows-TaskScheduler%4Operational.evtx | Event Log Explorer |
Event viewer -> Applications & service logs -> Microsoft -> Windows -> TaskScheduler -> Operational | Microsoft-Windows-TaskScheduler%4Operational.evtx | Event Log Explorer |
What | Where | Tool |
---|---|---|
Windows version and installation date |
|
|
Computer name |
|
|
Timezone |
|
|
Startup and shutdown time |
|
|
What | Where | Tool |
---|---|---|
Identify physical cards |
|
|
Identify interface configuration |
|
|
Connections History |
|
|
Network shares |
|
|
What | Where | Tool |
---|---|---|
Username, creation date ,login date, SID |
|
|
Login, logout, deletion, creation |
|
|
What | Where | Tool |
---|---|---|
File name, path, timestamps, actions (i.e rename) |
|
|
Information about deleted files |
|
|
What | Where | Tool |
---|---|---|
Failed/Succesful object access |
|
|
Recently used files/folders |
|
|
Accessed folders |
|
|
Accessed files, its path, metadata, timestamps, drive letter |
|
|
Frequently accessed files |
|
|
What | Where | Tool |
---|---|---|
Vendor ID, Product ID, Serial Number, Device name |
|
|
Serial Number, First connection time, last connection time, last removal time |
|
|
USB Label |
|
|
GUID, TYPE, serial number |
|
|
VolumeGUID, Volume letter, serial number |
|
|
Serial number, first connection time |
|
|
Serial number, connections times, drive letter |
|
|
Automation |
|
|
What | Where | Tool |
---|---|---|
Windows Services executable, date added |
|
|
Service installation time, Service crashed, stop/start service event |
|
|
Autorun applications |
|
|
Frequently run programs, last time, number of execution |
|
|
Run of older applications on newer system |
|
|
files path, md5 & sha1 hash |
|
|
Background applications |
|
|
Filename, size, run count, each run timestamp, path |
|
|
Program network usage, memory usage |
|
|
Scheduled task |
|
|
What | plugin |
---|---|
List processes | windows.pslist |
Scan image for hidden processes | windows.psxview |
List network connections | windows.netscan |
List files loaded in memory | windows.filescan |
Look for malicious codes in memory | windows.malfind |
What | filter |
---|---|
Source IP | ip.src == "127.0.0.1" |
Destination IP | ip.dst == "127.0.0.1" |
Protocol | http - ftp - dns - etc. |
Source port | tcp.srcport == "80" - udp.srcport == "80" |
Destination port | tcp.dstport == "80" - udp.dstport == "80" |