Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Week 8 - Part1: An Introduction to Registry Viewer


Objectives

  • Export registry information from a forensic image
  • Examine registry hives using Registry Viewer
  • Introduce Reg Ripper as an automated registry analysis tool

The Windows Registry is a central database that stores configuration details for the operating system and user accounts. Understanding how to extract and interpret this data is a core skill in digital forensics.

Requirements

You will need:

  • FTK Imager (It should be installed on all the CyberLab machine )
  • The file Clampet16.EO1, you can either:

Task 1: Exporting Registry Files from a Forensic Image

This task introduces evidence extraction. You will locate and export registry hives that contain system-level and user-level artefacts.

  1. In your Documents folder, create a directory named Clampet Registry Files.
    This folder will store all exported registry hives for later analysis.

  2. Inside this directory, create four subfolders: Elly, Granny, Jed, and Jethro.
    These correspond to Windows user accounts found on the evidence image.

  3. Open FTK Imager and load the Clampet16.EO1 image file.

    diagram diagram
  4. Expand the evidence tree and navigate to:
    WINDOWS → System32 → Config
    This directory contains the core system hives used by Windows.

    diagram diagram
  5. Export the registry hives SAM, SYSTEM, SECURITY, and SOFTWARE.
    These files store system configuration, security settings, installed software, and account data.

    diagram
  6. Navigate to Documents and Settings.
    For each user folder (Elly, Granny, Jed, Jethro), export the corresponding NTUSER.DAT file.
    This hive contains user-specific settings such as recent activity, program usage, and application preferences.

    diagram

Task 2: Registry Viewer Searching

This task introduces keyword and date-based searches to identify relevant artefacts.

  1. Launch FTK Registry Viewer.
    If not installed, download it from: https://www.exterro.com/ftk-product-downloads/registry-viewer-2-0-0

    If prompted with No Security Device Was Found, select No to continue.

  2. Open the NTUSER.DAT file for Jethro.
    User hives are extremely valuable, as they reveal recent activity and user-specific settings.

    diagram
  3. Use Edit → Find to search for Printers.
    This helps identify printing activity or installed virtual printers.

    diagram
  4. Use Find Next (F3) to move through the entries.
    Look for network printers or unusual printer paths, as they may indicate past connections.

    diagram diagram
  5. Check relevant entries and add them to the Report.
    Reporting allows you to collect evidence in a structured format.

  6. Clear search results when finished.

  7. Select Edit → Search by Date.
    This feature highlights registry keys modified within a given timeframe.

  8. Choose During a date range and enter the example settings.

    diagram
  9. Review the returned results.
    Registry timestamps often help reconstruct timelines, showing when software was installed, settings changed, or user activity occurred.


Task 3: Reviewing the SAM Registry

The SAM hive stores local user account data. It is essential for identifying who used the system and how often.

  1. Open the SAM registry file.

    diagram
  2. Expand the following structure:
    SAM → Domains → Account → Users

    diagram diagram
  3. Select the user with subkey 000003E8.
    Review the properties and complete the table:

    • SID Number:
    • User Name:
    • Full Name:
    • Logon Count:
    • Last Logon Time:

These values help identify which account corresponds to which individual and how active the account was.


Task 4: Reviewing the SYSTEM Registry

The SYSTEM hive provides details on system configuration, startup settings, connected devices, and time settings.

  1. Open the SYSTEM registry file.

    diagram
  2. Select the Select subkey.
    This reveals which ControlSet was active when the system was last running.

    diagram
  3. Navigate to:
    System → CurrentControlSetXXX → Control → TimeZoneInformation
    Time zone details are essential when aligning log files and event timestamps.

    diagram

Task 5: Reviewing the SOFTWARE Registry

The SOFTWARE hive contains details about installed software, system version, updates, and licensing.

  1. Open the SOFTWARE registry file.

    diagram
  2. Navigate to:
    Microsoft → Windows NT → CurrentVersion

    Extract the following information:

    • Registered Owner
    • Registered Organisation
    • Product Name
    • OS Service Pack Information
    • Product ID

These values help build a profile of the system identity, OS version, and licensing information.



Best,

Ali.

Copyright © 2026 • Created by Ali Jaddoa

Page last updated: Monday 09 March 2026 @ 08:38:02 | Commit: 93989c0