Shadow Volume Trash: $Recycle.Bin Forensics for Windows 7 and Windows Vista Shadow Volumes
نویسنده
چکیده
According to Microsoft, over one-third of all data loss is the result of accidental file deletion or modification (Microsoft, 2003). The Volume Shadow Copy Service is a Windows operating system service that archives key data and system settings. This allows Windows 7 and Windows Vista to recover from accidental data deletion and from destabilizing events, such as a virus attack or the incorrect installation of a software or hardware device. This archiving service also makes it possible for a user to view " previous versions " of documents. Because of the amount of data that this service archives, it has been referred to as a gold mine of forensic evidence. One of the key sets of data that gets copied by the Volume Shadow Copy Service is the user's Recycle Bin data. Recycle Bin data includes records of the most recently discarded (" deleted ") files of the user. The process of archiving Recycle Bin data by the Volume Shadow Copy Service is achieved by taking a " volume snapshot. " " Volume snapshot " data is stored in what is known as a " shadow volume. " Because a " shadow volume " is not located within the traditional file-tree structure of the operating system, the usual methods employed by forensic computer examiners to analyze this data cannot be used. A new approach for examining this data is required. In the following pages, the author explains how the Volume Shadow Copy Service archives Recycle Bin data into shadow volumes. The use of the " vssadmin list shadows " command is introduced as a way to identify the shadow volumes that exist within an operating system. The author further explains how to create " symbolic links " to access individual shadow volumes. The challenges that a forensic computer examiner faces when attempting a manual examination of a shadow volume are also explained. The author concludes his exposition by suggesting the forensic computer examiner should use the software tool Shadow Miner, a tool that automates the forensic examination of Recycle Bin data that has been archived into a shadow volume.
منابع مشابه
Cyber Dumpster-Diving: $Recycle.Bin Forensics for Windows 7 and Windows Vista
Analysis of deleted files often provides useful information for the forensic computer examiner. Knowing where to find the deleted files, and how to interpret the metadata associated with the file’s deletion, make up the cornerstone of a successful forensic computer examination. Much like an office trash-can, the Microsoft Windows Recycle Bin is a temporary holding container for files that have ...
متن کاملDetecting Hidden Encrypted Volumes
Hidden encrypted volumes can cause problems in digital investigations since they provide criminal suspects with a range of opportunities for deceptive antiforensics and a countermeasure to legislation written to force suspects to reveal decryption keys. This paper describes how hidden encrypted volumes can be detected, and their size estimated. The paper shows how multiple copies of an encrypte...
متن کاملGeometry Image-based Shadow Volume Algorithm for Subdivision Surfaces
How to generate shadow volumes efficiently for subdivision surfaces remains a challenging task for computer graphics community. We present a geometry image based algorithm that runs on GPUs (Graphics Process Units). By using GPU shaders, two geometry images containing position and normal vector information will be computed from the control meshes. By detecting silhouettes and extruding shadow v...
متن کاملMessenger Forensics on Windows Vista and Windows 7
The purpose of this study is to identify several areas of forensic interest within the Yahoo! Messenger application, which are of forensic significance. This study focuses on new areas of interest within the file structure of Windows Vista and Windows 7. One of the main issues with this topic is that little research has been previously conducted on the new Windows platforms. Previously conducte...
متن کاملMessenger Forensics on Windows Vista and Windows
The purpose of this study is to identify several areas of forensic interest within the Yahoo! Messenger application, which are of forensic significance. This study focuses on new areas of interest within the file structure of Windows Vista and Windows 7. One of the main issues with this topic is that little research has been previously conducted on the new Windows platforms. Previously conducte...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009