Volume Shadow Copy and Registry Forensics

Asphyxia

Owner
Administrator
Joined
Apr 25, 2015
Messages
1,847
Solutions
2
Reaction score
2,202
Points
327
What is covered in this PDF?
  • Volume Shadow Copy Basics
  • Shadow Copies on a Live Machine
  • Some Command Line
  • Shadow Explorer
  • Working with Disk Images
  • Some Registry Keys

Overwritten data: Values and data in keys such as typed URLs may be over-written from one session to another

Registry Related Timeline Analysis: You may be able to determine user activity during a more extended time frame

Anti-Anti-Forensics: Technologically sophisticated users may attempt to “clean” their Registry
 

Attachments

Top