Difference between pages "Prefetch" and "Training Courses and Providers"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(See Also)
 
(COMMERCIAL TRAINING)
 
Line 1: Line 1:
{{Expand}}
+
This is the list of Training Course Providers, who offer training courses at specific dates/times and locations (referred to by [[Upcoming_events]]).
Windows Prefetch files, introduced in [[Windows|Windows XP]], are designed to speed up the application startup process. Prefetch files contain the name of the executable, a Unicode list of DLLs used by that executable, a count of how many times the executable has been run, and a timestamp indicating the last time the program was run. Although Prefetch is present in Windows 2003, by default it is only enabled for boot prefetching. The feature is also found in [[Windows|Windows Vista]], where it has been augmented with [[SuperFetch]], [[ReadyBoot]], and [[ReadyBoost]]. For SSD drives Prefetch is disabled by default [http://blogs.msdn.com/b/e7/archive/2009/05/05/support-and-q-a-for-solid-state-drives-and.aspx].
+
  
Up to 128 Prefetch files are stored in the <tt>%SystemRoot%\Prefetch</tt> directory [http://blogs.msdn.com/ryanmy/archive/2005/05/25/421882.aspx]. Each file in that directory should contain the name of the application, a dash, and then an eight character hash of the location from which that application was run, and a <tt>.pf</tt> extension. The filenames should be all uppercase except for the extension. The format of hashes is not known. A sample filename for [[md5deep]] would look like: <tt>MD5DEEP.EXE-4F89AB0C.pf</tt>. If an application is run from two different locations on the drive (i.e. the user runs <tt>C:\md5deep.exe</tt> and then <tt>C:\Apps\Hashing\md5deep.exe</tt>), there will be two different prefetch files in the Prefetch folder.
+
<b>PLEASE READ BEFORE YOU EDIT THE LIST BELOW</b><br>
 +
Providers of scheduled training courses should be listed in alphabetical order, and should be listed in only one section. Non-Commercial training is typically offered by governmental agencies or organizations that directly support law enforcement. Tool Vendor training is training offered directly by a specific tool vendor, which may apply broadly, but generally is oriented to the vendor's specific tool (or tool suite). Commercial Training is training offered by commercial companies which may or may not be oriented to a specific tool/tool suite, but is offered by a company other than a tool vendor.
  
 +
<i>Some training opportunities may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
  
== Signature ==
+
The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv.
Each Prefetch file has a signature in the first 8 bytes of the file.
+
<i> (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST)</i>
* Windows XP and Windows 2003 Prefetch file's signature is \x11\x00\x00\x00\x53\x43\x43\x41 (0x41434353 0x00000011).
+
Requests for additions, deletions or corrections to this list may be sent by email to David Baker <i>(bakerd AT mitre.org)</i>.
* Windows Vista and Windows 7 Prefetch file's signature is \x17\x00\x00\x00\x53\x43\x43\x41 (0x41434353 0x00000017).
+
  
The [http://en.wikipedia.org/wiki/ASCII ASCII] representation of these bytes will display "....SCCA".
+
==NON-COMMERCIAL TRAINING==
 +
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="40%"|Website
 +
! width="20%"|Limitation
 +
|-
 +
|Defense Cyber Investigations Training Academy (DCITA)
 +
|http://www.dc3.mil/dcita/dcitaAbout.php
 +
|Limited To Certain Roles within US Government Agencies[http://www.dc3.mil/dcita/dcitaRegistration.php (1)]
 +
|-
 +
|Federal Law Enforcement Training Center
 +
|http://www.fletc.gov/training/programs/computer-financial-intelligence/technical-operations
 +
|Limited To Law Enforcement
 +
|-
 +
|MSU National Forensics Training Center
 +
|http://www.security.cse.msstate.edu/ftc
 +
|Limited To Law Enforcement
 +
|-
 +
|IACIS
 +
|http://www.cops.org/training
 +
|Limited To Law Enforcement and Affiliate Members of IACIS
 +
|-
 +
|SEARCH
 +
|http://www.search.org/programs/hightech/calendar.asp
 +
|Limited To Law Enforcement
 +
|-
 +
|National White Collar Crime Center
 +
|http://www.nw3c.org/ocr/courses_desc.cfm
 +
|Limited To Law Enforcement
 +
|-
 +
|}
  
== Timestamps ==
+
==TOOL VENDOR TRAINING==
 +
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="40%"|Website
 +
! width="20%"|Limitation
 +
|-
 +
|AccessData (Forensic Tool Kit FTK)
 +
|http://www.accessdata.com/courses.html
 +
|-
 +
|ASR Data (SMART)
 +
|http://www.asrdata.com/training/
 +
|-
 +
|BlackBag Technologies (Macintosh Forensic Suite and MacQuisition Boot Disk)
 +
|http://www.blackbagtech.com/products/training.htm
 +
|-
 +
|CPR Tools (Data Recovery)
 +
|http://www.cprtools.net/training.php
 +
|-
 +
|Guidance Software (EnCase)
 +
|http://www.guidancesoftware.com/training/course_schedule.aspx
 +
|-
 +
|Nuix (eDiscovery)
 +
|http://www.nuix.com.au/eDiscovery.asp?active_page_id=147
 +
|-
 +
|Paraben (Paraben Suite)
 +
|http://www.paraben-training.com/training.html
 +
|-
 +
|Technology Pathways(ProDiscover)
 +
|http://www.techpathways.com/DesktopDefault.aspx?tabindex=6&tabid=9
 +
|-
 +
|SubRosaSoft (MacForensicsLab)
 +
|http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=index&cPath=2
 +
|-
 +
|WetStone Technologies (Gargoyle, Stego Suite, LiveWire Investigator)
 +
|https://www.wetstonetech.com/trainings.html
 +
|-
 +
|X-Ways Forensics (X-Ways Forensics)
 +
|http://www.x-ways.net/training/
 +
|-
 +
|}
  
Both the [[NTFS]] timestamps for a Prefetch file and the timestamp embedded in each Prefetch file contain valuable information. The timestamp embedded within the Prefetch file is a 64-bit (QWORD) [http://msdn2.microsoft.com/en-us/library/ms724284.aspx FILETIME] object The creation date of the file indicates the first time the application was executed. Both the modification date of the file and the embedded timestamp indicate the last time the application was executed.
+
==COMMERCIAL TRAINING==
 
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
Windows will store timestamps according to Windows [http://msdn.microsoft.com/en-us/library/ms724290%28VS.85%29.aspx epoch].
+
|- style="background:#bfbfbf; font-weight: bold"
 
+
! width="40%"|Title
==== Creation Time ====
+
! width="40%"|Website
The creation time does not have a static offset on any Windows platform. The location of the creation time can be found using the offset 0x8 + length of Volume path offset. See section Volume for more information.
+
! width="20%"|Limitation
 
+
|-
==== Last Run Time ====
+
|Computer Forensic Training Center Online (CFTCO)
A timestamp of when the application was last ran is embedded into the Prefetch file.
+
|http://www.cftco.com/
The offset from the beginning of the file to the "Last Run Time" is located:
+
|-
* at offset 0x78 on Windows XP and Windows 2003.
+
|CCE Bootcamp
* at offset 0x80 on Windows Vista and Windows 7.
+
|http://www.cce-bootcamp.com/
 
+
|-
== MetaData ==
+
|e-fense Training
==== Header ====
+
|http://www.e-fense.com/training.php
In each Prefetch file, the size of the header is stored and can be found at offset 0x54 on [[Windows|Windows XP]], [[Windows|Windows Vista]], and [[Windows|Windows 7]]. The header size for [[Windows|Windows XP]] is 0x98 (152) and 0xf0 (240) on Windows Vista and Windows 7.
+
|-
 
+
|-
The Prefetch file will embed the application's name into the header at offset 0x10.
+
|Forward Discovery, Inc.
 
+
|http://www.forwarddiscovery.com
==== Run Count ====
+
|-
The run count, or number of times the application has been run, is a 4-byte (DWORD) value located at offset 0x90 from the beginning of the file on [[Windows|Windows XP]]. On [[Windows|Windows Vista]] and [[Windows|Windows 7]], the run time can be found at 0x98.
+
|H-11 Digital Forensics
 
+
|http://www.h11-digital-forensics.com/training/viewclasses.php
==== Volume ====
+
|-
Volume related information, volume path and volume serial number, are embedded into the Prefetch file. The precise offset for this information is the same for each Prefetch file and Windows operating system. In the header at offset 0x6c, the location of the volume path is stored. The location is a 4-bytes (DWORD) value.
+
|High Tech Crime Institute
 
+
|http://www.gohtci.com
At the location given from offset 0x6c, a 4-byte value is stored which is the number of bytes from current offset (location from offset 0x6c) to the beginning of the volume path string. The location from the offset 0x6c, for ease of reading, will be called the "volume path offset." The volume path is embedded as an [http://en.wikipedia.org/wiki/UTF-16/UCS-2 UTF-16] encoded string.
+
|-
 
+
|Infosec Institute
The length of the volume path string is a 4-byte value is located at volume path offset + 0x4.
+
|http://www.infosecinstitute.com/courses/security_training_courses.html
 
+
|-
The volume [http://en.wikipedia.org/wiki/Volume_serial_number serial number] is a 4-byte value that identifies a media storage. A serial number does not have a consistent offset within a Prefetch between Windows operating systems. The 4-byte value can be found eight (8) bytes from the creation time location. The [http://en.wikipedia.org/wiki/Vol_%28command%29 vol] command on Windows can verify the volume serial number.
+
|ManTech Computer Security Training
 
+
|http://www.mantech.com/msma/isso.asp
==== End of File ====
+
|-
The end of file (EOF) for each Prefetch file is located at offset 0xc. The location of EOF also denotes the size of the Prefetch file.
+
|Mobile Forensics, Inc
 
+
|http://mobileforensicsinc.com/
==== Files ====
+
|-
 
+
|NTI (an Armor Forensics Company)
Embedded within each Prefetch file are files and directories that were used doing the application's startup. The Prefetch file separates both filenames and directories into two different location in the file. Each string is encoded as a [http://en.wikipedia.org/wiki/UTF-16/UCS-2 UTF-16] string. Windows operating system uses UTF-16 encoding.
+
|http://www.forensics-intl.com/training.html
 
+
|-
The offset to the first set of filenames are at 0x64. The size of the first set of filenames can be found at offset 0x68. Both offsets are consistent between Windows XP, Windows Vista and Windows 7.
+
|Security University
 
+
|http://www.securityuniversity.net/classes.php
In the bottom section of the Prefetch file are UTF-16 strings of directories. At the time of this writing (7/2011), the precise offset and size of the directory listing is unknown. The distance between the end of the Volume Path string and the beginning of the directory strings is given. An approach to finding the offset to the beginning of the directories listing is to obtain the distance value and the offset when the Volume Path string ends (after the NULL bytes). The distance value is at volume path offset + 0x18 (24). The distance is a 4-byte (DWORD) value. The end of second set of strings will complete the Prefetch file. The size of the directory listing is calculated by subtracting the start position of the directory listing from the end of file position.
+
|-
 
+
|Steganography Analysis and Research Center (SARC)
== See Also ==
+
|http://www.sarc-wv.com/training.aspx
* [[Windows Prefetch File Format]]
+
|-
* [[SuperFetch]]
+
|SysAdmin, Audit, Network, Security Institute (SANS)
* [[Prefetch XML]]
+
|http://forensics.sans.org
* [[Windows]]
+
|-
 
+
|Vigilar
== External Links ==
+
|http://www.vigilar.com/training/
* [http://www.microsoft.com/whdc/driver/kernel/XP_kernel.mspx#ECLAC Microsoft's description of Prefetch when Windows XP was introduced]
+
|-
* [http://msdn.microsoft.com/msdnmag/issues/01/12/XPKernel/default.aspx More detail from Microsoft]
+
|}
* [http://en.wikipedia.org/wiki/Prefetcher Wikipedia Prefetcher]
+
* [http://42llc.net/?page_id=215 Yogesh Khatri's Prefetch Research]
+
* [http://journeyintoir.blogspot.ch/2012/12/ntosboot-prefetch-file.html NTOSBOOT Prefetch File], by [[Corey Harrell]], December 5, 2012
+
 
+
=== Tools ===
+
* [http://milo2012.wordpress.com/2009/10/19/windows-prefetch-folder-tool/ Prefetch-Tool Script] - Python looks Prefetch files up on a web server.
+
* [http://www.mitec.cz/wfa.html Windows File Analyzer] - Parses Prefetch files, thumbnail databases, shortcuts, index.dat files, and the recycle bin
+
* [http://www.tzworks.net/prototype_page.php?proto_id=1 Windows Prefetch parser] Free tool that can be run on Windows, Linux or Mac OS-X.
+

Revision as of 11:37, 10 April 2009

This is the list of Training Course Providers, who offer training courses at specific dates/times and locations (referred to by Upcoming_events).

PLEASE READ BEFORE YOU EDIT THE LIST BELOW
Providers of scheduled training courses should be listed in alphabetical order, and should be listed in only one section. Non-Commercial training is typically offered by governmental agencies or organizations that directly support law enforcement. Tool Vendor training is training offered directly by a specific tool vendor, which may apply broadly, but generally is oriented to the vendor's specific tool (or tool suite). Commercial Training is training offered by commercial companies which may or may not be oriented to a specific tool/tool suite, but is offered by a company other than a tool vendor.

Some training opportunities may be limited to Law Enforcement Only or to a specific audience. Such restrictions should be noted when known.

The Conference and Training List is provided by the American Academy of Forensic Sciences (AAFS) Digital and Multi-media Listserv. (Subscribe by sending an email to listserv@lists.mitre.org with message body containing SUBSCRIBE AAFS-DIGITAL-MULTIMEDIA-LIST) Requests for additions, deletions or corrections to this list may be sent by email to David Baker (bakerd AT mitre.org).

NON-COMMERCIAL TRAINING

Title Website Limitation
Defense Cyber Investigations Training Academy (DCITA) http://www.dc3.mil/dcita/dcitaAbout.php Limited To Certain Roles within US Government Agencies(1)
Federal Law Enforcement Training Center http://www.fletc.gov/training/programs/computer-financial-intelligence/technical-operations Limited To Law Enforcement
MSU National Forensics Training Center http://www.security.cse.msstate.edu/ftc Limited To Law Enforcement
IACIS http://www.cops.org/training Limited To Law Enforcement and Affiliate Members of IACIS
SEARCH http://www.search.org/programs/hightech/calendar.asp Limited To Law Enforcement
National White Collar Crime Center http://www.nw3c.org/ocr/courses_desc.cfm Limited To Law Enforcement

TOOL VENDOR TRAINING

Title Website Limitation
AccessData (Forensic Tool Kit FTK) http://www.accessdata.com/courses.html
ASR Data (SMART) http://www.asrdata.com/training/
BlackBag Technologies (Macintosh Forensic Suite and MacQuisition Boot Disk) http://www.blackbagtech.com/products/training.htm
CPR Tools (Data Recovery) http://www.cprtools.net/training.php
Guidance Software (EnCase) http://www.guidancesoftware.com/training/course_schedule.aspx
Nuix (eDiscovery) http://www.nuix.com.au/eDiscovery.asp?active_page_id=147
Paraben (Paraben Suite) http://www.paraben-training.com/training.html
Technology Pathways(ProDiscover) http://www.techpathways.com/DesktopDefault.aspx?tabindex=6&tabid=9
SubRosaSoft (MacForensicsLab) http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=index&cPath=2
WetStone Technologies (Gargoyle, Stego Suite, LiveWire Investigator) https://www.wetstonetech.com/trainings.html
X-Ways Forensics (X-Ways Forensics) http://www.x-ways.net/training/

COMMERCIAL TRAINING

Title Website Limitation
Computer Forensic Training Center Online (CFTCO) http://www.cftco.com/
CCE Bootcamp http://www.cce-bootcamp.com/
e-fense Training http://www.e-fense.com/training.php
Forward Discovery, Inc. http://www.forwarddiscovery.com
H-11 Digital Forensics http://www.h11-digital-forensics.com/training/viewclasses.php
High Tech Crime Institute http://www.gohtci.com
Infosec Institute http://www.infosecinstitute.com/courses/security_training_courses.html
ManTech Computer Security Training http://www.mantech.com/msma/isso.asp
Mobile Forensics, Inc http://mobileforensicsinc.com/
NTI (an Armor Forensics Company) http://www.forensics-intl.com/training.html
Security University http://www.securityuniversity.net/classes.php
Steganography Analysis and Research Center (SARC) http://www.sarc-wv.com/training.aspx
SysAdmin, Audit, Network, Security Institute (SANS) http://forensics.sans.org
Vigilar http://www.vigilar.com/training/