Windows 8 Forensics: Recycle Bin

Overview

Today I am starting the preliminary research on the Windows 8 Operating System from a Digital Forensics standpoint. I will be comparing it primarily to known information on the Windows 7 Operating System. There are going to be many items that I am looking at, and any comments with suggestions for further things to look into would be appreciated.

Topics so far include:

  • Recycle Bin Properties
  • USB Drive Activity
  • Internet History
  • Windows 8 Reset and Reload Feature
  • Event Logs
  • Prefetch Files
  • Jump Lists
  • File History Feature

As I dig into these topics, there is likely to be a large amount of information that will be discovered. It is important to remember, though, that some of these topics may yield little to no differences.

Purpose

The purpose of this project is to determine key differences between the Windows 7 and Windows 8 operating system from a forensic standpoint in order to determine if there are any significant changes that will be either beneficial or detrimental to the forensic investigation process.

Version:1.0 StartHTML:0000000167 EndHTML:0000003071
StartFragment:0000000747 EndFragment:0000003055 Version:1.0
StartHTML:0000000167 EndHTML:0000002862 StartFragment:0000000747
EndFragment:0000002846

Windows 8 Recycle Bin

No shocking information to be found here, the Windows 8 recycle bin behaves just like the Windows 7 recycle bin.

The original blog post for this can be found at the Patrick Leahy Center for Digital Investigation blog, but this is a slightly edited version.

We still find the $Recycle.Bin, $R, and $I files. Here’s a breakdown of my methodology.

  • Created “I wonder if this will appear“ at 10:14
  • Deleted “I wonder if this will appear“ at 10:14
  • Created “test document.txt“ at 10:22
  • Deleted “test document.txt“ at 10:23
  • Created “lets try this” at 10:40 – filled it with text, 36.5 mb
  • Deleted “lets try this“ at 10:40

Recycle Bin in EnCase still has $Recycle.Bin and $I files. The actual $R notation can be found when looking at simply the user ID under the recycle bin, but since the $R file is the file data itself, it is represented by the file name in the recycle bin.

Located and verified times of “test document”, “lets try this”, and “I wonder if this will appear” to be accurate to what I recorded when creating/deleting originally.

Verified hex values for $I files in comparison to known Windows 7 values.

Bytes 0-7 are still the file header, always 01 followed by seven sets of 00.

Bytes 8-15 are the original file size, stored in hex, in little-endian. This can be converted into big endian format and converted with a hex calculator to a decimal notation to determine the size in bytes. I tested this with the “Lets try this” document that was 36.5mb. The hex value in encase was F0 E2 39 02, read in little endian. Converting this into big endian yields 02 39 E2 F0, which ran through a hex calculator shows that it is 37348080 bytes, which is roughly 36.5mb

Bytes 16-23 reflect the deleted date time stamp, represented per normal standards (number of seconds since Midnight, January 1, 1601).

Bytes 24-543 reflect the original file path/name.

About the Author:

Ethan Fleisher is a Senior majoring in Computer and Digital Forensics at Champlain College. Originally from Carlisle, Pennsylvania, Ethan currently works as a Forensic Intern and System Administrator at the Senator Patrick Leahy Center for Digital Investigation where he is involved in real life investigation forensic analysis, network and system administration, and forensic research. Ethan has spent close to the last year researching the Microsoft Windows 8 OS with focus on revealing new artifacts and attempting to confirm previous methodologies.

(Guest post provided by Ethan Fleisher. Original article can be found at Champlain College and the author’s blog dig4n6.blogspot.com.)
About these ads

~ by D. Dieterle on August 13, 2012.

9 Responses to “Windows 8 Forensics: Recycle Bin”

  1. [...] Overview Today I am starting the preliminary research on the Windows 8 Operating System from a Digital Forensics standpoint. I will be comparing it primarily to known information on the Windows 7 O…  [...]

  2. [...] on cyberarms.wordpress.com Bookmark the [...]

  3. Reblogged this on lava kafle kathmandu nepal.

  4. [...] Overview Today I am starting the preliminary research on the Windows 8 Operating System from a Digital Forensics standpoint. I will be comparing it primarily to known information on the Windows 7 Operating System.  [...]

  5. [...] Read Ethan’s full review here – http://cyberarms.wordpress.com/2012/08/13/windows-8-forensics-recycle-bin/ [...]

  6. [...] Overview Today I am starting the preliminary research on the Windows 8 Operating System from a Digital Forensics standpoint. I will be comparing it primarily to known information on the Windows 7 O…  [...]

  7. [...] Windows 8: File Forensics Part 1 – Recycle Bin [...]

  8. Reblogged this on Danielito C. Vizcayno Blogs.

  9. [...] http://cyberarms.wordpress.com/2012/08/13/windows-8-forensics-recycle-bin/ [...]

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
Follow

Get every new post delivered to your Inbox.

Join 284 other followers

%d bloggers like this: