Time
4 hours 15 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:01
Hello. I will come back to the course. So in the previous models we were like Sinn Fein, forensic sanctions or key points. The issue look for will examine in a foreign city much or life system who have seen security identifiers, the system registry, the winners profession. Our store points in this morning, we're going to start their cycle,
00:20
which some researchers describe it as a gold mine
00:23
for gathering evidence close. By analyzing the recycling, you can cover useful data
00:30
they recycle being someplace called recycler recycled. Or the motorcycle that mean the venue in the very front of windows is not in more than another fall. During Windows, users will commonly respond that they needed a file with what they really mean is that they send the file to the recycle. The
00:49
When a fire is dilated in the Microsoft Windows operating system,
00:53
it doesn't really permanently is stored in the recycle view.
00:58
If a user wants to restore daily refile for their cycle, be it can be done. If the usual holds the chief K at the time off the rear file, then if I will be deleted permanently without being stored in the Recycle Bin in this case, the families move toe here sister folder,
01:15
where it is the name our store before the instructions are given
01:19
as to what is to happen to the file
01:22
toe. Understand how information fights are structure on how the name information works. There must first be understanding off how the recycle being works. When a user the leads are filed in Windows, the fire itself is no actually deleted. The file at this point is copied into the recycle this sister folder,
01:41
where is held on to the user gift for the restrictions on what to do with the file.
01:47
This location varies depending on the version of Windows that the user is running. The table here shows locations from Windows 95 98 on me, where the location of glorifies what's in the folder name recycled
02:01
on Windows NT with those to tell someone when the SEC speak where their cycle being worth named recycler
02:09
on will just be start 17. Whether cycle being is called Dora recycled that being
02:17
Windows Vista and I both know use metal their information to start the selective fire. Some folders, you know, recycle, for they're called the silent recycle that be before being permanently related, We lose six PM below of users who have differently named recycle folders under Dr called
02:37
either recycled or recycler.
02:39
When you delete a fire in with news X, p Explorer or my computer, the fun immediately appears in their cycle being
02:47
this is what you see. Actually, there is something going on the background, the complete past. Our file or folder name is stored in a hidden file called in for two, which is inside the recycled order cycle folder.
03:01
This file is very important because if in photo gets corrupted or removed normally, anything currently in their cycle B could be lost. Unless you try to use a piece off their Cory suffer to get it back.
03:15
You photo axel index a repository of information about five cents to the recycle be It contains entries lt fiber index number which describes the reunify size full past name and size off the data file.
03:30
We'll speak when files are moved to the recycling. Their place within a human director named Recycler s i d. Where s I D? Is this a curia identifier off the user that performed the militia?
03:44
The fires are named begin without the presumably for deleted, followed by the drive there where the farm produce two recited our incriminated number on the file for you Nurse station. Although the first name is changed, the date a physical location in the disc the size on cold are unchanged
04:03
on the fire can still be open or viewed.
04:06
Each filings to recycle be gets his own record in the info to fire.
04:13
With his record being 800 bytes inland,
04:16
these a photo file records contain reporting information that examiners can analyze and used in the investigation
04:25
some researchers have found during window seven on Mr Max off. Stop using the info to fight and completely changed the way fights were named on indexed within the recycle be Firstly, the new recycle being is located in a hidden directory named Doris Signed Recycle that bean.
04:44
Backslash is Heini.
04:46
Where s I D? Is the security identifier off the use of the performer relation.
04:50
Secondly, where fires are moved into the recycle being, the original file is your name. $2 are followed by a set off random characters but maintaining their unifying extension
05:04
at the same time on you filed beginning with dollar I followed by the same set off random characters given to the door. Our file on the same extension is created. This file contains the renal file Name of path there Enough, I say's on the date and time that the file was moved to the recycling.
05:24
All off the dollar I fight decidedly 544 bites long.
05:30
The behavior is a bit different when you knew for directory to recycle be the directory name itself is renamed Toe are followed by a set off random characters. But the five or directors under that directory my tender you know names
05:45
adore I file is created just us well reading and we will fight the contestant. You know, director name
05:50
dates untimed deleted on size.
05:55
When you see the information contained in the lower I fight for forensic purposes, you can see the whole five found under the door are derogatory structure within the recycled me were greeted at the same time If a fine was producing related out of there Now the leader directory
06:13
You will have his own lawyer are under high five on not be good with the files that were deleted a spot of the direct regulation. Actually,
06:24
fortunately or like the photo file, the new dollar I fires are not in plain or readable texts in orderto the cold
06:32
Laura I file you could use a forensic tow the hostile ability to interpret this fight, such as Durai Pars. In case on F decay. You completely open the file in a hex air. It'll socials with Hex. The file structure are follows. Bite 0 to 7 is the fight. Heather
06:53
always said so. Seo won
06:55
for by seven cents off Cyril Cyril bites A 15 is reunify size stored in Hex Leader,
07:04
but 16 to 23 is the leader. Date on times time, representing number off seconds since midnight January 1st off. 60 No. One by stoning for 2 543 is the reunified past. Our name
07:21
in Windows 10. The contents are still split toe door I under our fight, but the organization of the door I fight art slightly different door I files from window standards like beings very slightly from those in V, start through Windows 8.1. The chance is not significant
07:41
and provides us the ability
07:42
to distinguish between door if ice arena in front of Windows 10 system on those are in their infernal we lose, we start saving eight or eight point system.
07:51
This piece of information could be important. So instances, for example, if your corner a dollar, I fight in the unallocated space off a window stay, insisting you could determine if that file was an artifact from a previous long window staring installation.
08:09
The difference between the window stained daughter I fight on those from previous very shirts off windows is detailed in the table.
08:16
As you can see, the only structure a change in the Windows Time version appears to be the elation off the five name land field at Offset 24.
08:26
This will typically result indoor I files from Windows 10 system being smaller during prior versions, since the door I file is only a CE large as he needs to be. In previous versions, each dollar I file was the starting 500 for four bites
08:43
was no structure. Another change can be found in the heather
08:46
verse infused the her field for beast, a 78 on eight point where is excessive? No. One. Why this field is excessive. 024 windows 10. This makes it very easy to distinguish between the two versions. One. Parson.
09:05
Okay, here's the quick question for you.
09:07
We're coming. The leader fights be found in a Windows based environment. Do you think it's a you see this? I could in for two or B C A cycle in photo or C
09:20
see.
09:20
Do it or find a cycle that bean or D. C. You're assigned recycler that mean,
09:28
If you said Seagal correct? A corresponds to the location of clarifies in Windows 95 98 on me. The answer B is the location. So Windows NT on Expedia. Andi is not an existing location
09:43
to find that despite the changes to a different berry shorts off Windows to most users, their cycle being keeps on doing where it was originally designed to the store files that have been deleted from issues or account. Looking at what is in their cycle being this part off almost every forensic examination
10:01
we should place No, we were to find the deleted five
10:05
on how to understand the metadata. Your associate it with the first Galician.
10:09
Please don't forget to check the references and supplementary material on in the next morning will be analyzing some pertinent files that must be changed in a forensic examination, for instance, ho to extract information from office fights and some tools that we allow you to do that.

Up Next

Windows Forensics and Tools

The Windows Forensics and Tools course focuses on building digital forensics knowledge of Microsoft Windows operating systems, as well as some compatible software or tools that can be used to obtain or process information in such systems.

Instructed By

Instructor Profile Image
Adalberto Jose Garcia
Information Security Analyst at Bigazi
Instructor