Difference between pages "Windows Registry" and "Chip-Off BlackBerry Curve 9320"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(Open Source)
 
(Created page with "== Tear Down == <ol start="1"> <li>Remove the back panel.</li> </ol> {| border="1" cellpadding="2" |- | 300px |- |} <ol start="2"> ...")
 
Line 1: Line 1:
==File Locations==
+
== Tear Down ==
The Windows Registry is stored in multiple files.
+
  
===Windows NT 4 ===
+
<ol start="1">
In Windows NT 4 (and later) the Registry is stored in the [[Windows NT Registry File (REGF)]] format.
+
<li>Remove the back panel.</li>
 +
</ol>
  
Basically the following Registry hives are stored in the corresponding files:
+
{| border="1" cellpadding="2"
* HKEY_USERS: \Documents and Setting\User Profile\NTUSER.DAT
+
|-
* HKEY_USERS\DEFAULT: C:\Windows\system32\config\default
+
| [[File:1-bb9320-BackPanelRemoved.jpg| 300px ]]
* HKEY_LOCAL_MACHINE\SAM: C:\Windows\system32\config\SAM
+
|-
* HKEY_LOCAL_MACHINE\SECURITY: C:\Windows\system32\config\SECURITY
+
|}
* HKEY_LOCAL_MACHINE\SOFTWARE: C:\Windows\system32\config\software
+
* HKEY_LOCAL_MACHINE\SYSTEM: C:\Windows\system32\config\system
+
  
===Windows 98/ME===
+
<ol start="2">
* \Windows\user.dat
+
<li>Remove the SIM and SD Memory Card.</li>
* \Windows\system.dat
+
</ol>
* \Windows\profiles\user profile\user.dat
+
  
== Keys ==
+
<ol start="3">
 +
<li>Using a torx-6 screw driver remove the 2 visible screws on the back of the phone.</li>
 +
</ol>
  
=== Run/RunOnce ===
+
{| border="1" cellpadding="2"
System-wide:
+
|-
<pre>
+
| [[File:2-bb9320-ScrewRemoval.jpg| 300px ]]
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
+
|-
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
+
|}
</pre>
+
  
Per user:
+
<ol start="4">
<pre>
+
<li>Remove the screen protector using a shim, guitar pick, or prying tool.</li>
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
+
</ol>
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
+
</pre>
+
  
== Special cases ==
+
{| border="1" cellpadding="2"
The Windows Registry has several special case scenarios, mainly concerning key and value name, that most tools fail to account for:
+
|-
* special characters key and value names
+
| [[File:3-bb9320-ScreenRemoval.jpg| 300px ]]
* duplicate key and value names
+
|-
* the names when stored in extended ASCII (ANSI string) use a codepage that is dependent on the system settings
+
|}
  
=== special characters key and value names ===
+
<ol start="5">
Both key and values names are case insensitive. The \ character is used as the key separator. Note
+
<li>Remove 2 torx-5 screws.</li>
that the \ character can be used in value names. The / character is used in both key and value names.
+
</ol>
Some examples of which are:
+
<pre>
+
Key: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\NetBT\Parameters\
+
Value: Size/Small/Medium/Large
+
</pre>
+
  
<pre>
+
{| border="1" cellpadding="2"
Key: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Terminal Server\VIDEO\disc\
+
|-
Value: \Device\Video0
+
| [[File:4-bb9320-ScrewRemoval.jpg| 300px ]]
</pre>
+
|-
 +
|}
  
<pre>
+
<ol start="6">
Key:
+
<li>Use the shim to detach the outer bezel/keyboard from the device.</li>
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\services\xmlprov\Parameters\SchemaGroups\User\http://www.microsoft.com/provisioning/eaptlsuserpropertiesv1\
+
</ol>
Value: SchemaFile
+
</pre>
+
  
==Tools==
+
{| border="1" cellpadding="2"
===Open Source===
+
|-
* [https://www.pinguin.lu/index.php Forensic Registry EDitor (fred)] - "Forensic Registry EDitor (fred) is a cross-platform M$ registry hive editor" by Gillen Dan
+
| [[File:5-bb9320-TopPlate.jpg| 300px ]] 5-1-bb9320-TopPlate.jpg| 300px ]]
* [http://projects.sentinelchicken.org/data/doc/reglookup/regfi/ libregfi] - The regfi library is a read-only NT registry library which serves as the main engine behind the reglookup tool
+
|-
* [http://projects.sentinelchicken.org/reglookup/ reglookup] — "small command line utility for reading and querying Windows NT-based registries."
+
|}
* [http://sourceforge.net/projects/regviewer/ regviewer] — a tool for looking at the registry.
+
* [[RegRipper]] — "the fastest, easiest, and best tool for registry analysis in forensics examinations."
+
* [http://search.cpan.org/~jmacfarla/Parse-Win32Registry-0.51/lib/Parse/Win32Registry.pm Parse::Win32Registry] Perl module.
+
* [http://www.williballenthin.com/registry/index.html python-registry] Python module.
+
* [http://code.google.com/p/registrydecoder/ Registry Decoder] offline analysis component, by Andrew Case
+
* [http://code.google.com/p/registrydecoder/ RegDecoderLive] live hive acquisition component, by Andrew Case
+
* [[libregf]] - Library and tools to access the Windows NT Registry File (REGF) format
+
  
===Freeware===
+
<ol start="7">
* [http://www.tzworks.net/prototype_page.php?proto_id=3 Yet Another Registry Utility (yaru)] Free tool that can be run on Windows, Linux or Mac OS-X. If run in admin mode, allows viewing of registry hives on live system.
+
<li>Remove 4 additional torx-6 screws. The main board will now easily be separated from the back plate</li>
 +
</ol>
  
* [http://www.tzworks.net/prototype_page.php?proto_id=14 Windows ShellBag Parser] Free tool that can be run on Windows, Linux or Mac OS-X.
+
{| border="1" cellpadding="2"
 +
|-
 +
| [[File:6-bb9320-ScrewRemoval.jpg| 300px ]]
 +
|-
 +
|}
  
* [http://tzworks.net/prototype_page.php?proto_id=19 ''cafae''] - Computer Account Forensic Artifact Extractor.  Free tool that can be run on Windows, Linux or Mac OS-X to parse ntuser.dat hives.
+
<ol start="8">
 +
<li>Peel off the vendor sticker.</li>
 +
</ol>
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[File:7-bb9320-VendorPlate.jpg| 300px ]]
 +
|-
 +
|}
  
===Commercial===
+
<ol start="9">
* [http://www.abexo.com/free-registry-cleaner.htm Abexo Free Regisry Cleaner]
+
<li>Remove the plastic cover protecting the track pad ribbon cable, and disconnect the track pad.</li>
* [http://www.auslogics.com/registry-defrag Auslogics Registry Defrag]
+
</ol>
* [http://lastbit.com/arv/ Alien Registry Viewer]
+
* [http://www.larshederer.homepage.t-online.de/erunt/index.htm NT Registry Optimizer]
+
* [http://www.registry-clean.net/free-registry-defrag.htm iExpert Software-Free Registry Defrag]
+
* [http://paullee.ru/regundel Registry Undelete (russian)]
+
* [http://mitec.cz/wrr.html Windows Registry Recovery]
+
* [http://registrytool.com/ Registry Tool]
+
  
==Bibliography==
+
<ol start="10">
* [http://www.dfrws.org/2009/proceedings/p69-zhu.pdf Using ShellBag Information to Reconstruct User Activities.], Yuandong Zhu*, Pavel Gladyshev, Joshua James, DFRWS 2009
+
<li>Remove the final torx-4 screw located beneath the plastic protector, to remove the plastic keyboard overlay.</li>
* Recovering Deleted Data From the Windows Registry. Timothy Morgan, DFRWS 2008 [http://www.dfrws.org/2008/proceedings/p33-morgan.pdf [paper]] [http://www.dfrws.org/2008/proceedings/p33-morgan_pres.pdf [slides]]
+
</ol>
* [http://www.pkdavies.co.uk/documents/Computer_Forensics/registry_examination.pdf Registry Examination, by Paul Davies]
+
  
* [http://dfrws.org/2008/proceedings/p26-dolan-gavitt.pdf Forensic Analysis of the Windows Registry in Memory], Brendan Dolan-Gavitt, DFRWS 2008  [http://dfrws.org/2008/proceedings/p26-dolan-gavitt_pres.pdf [slides]]
+
{| border="1" cellpadding="2"
* [http://www.pkdavies.co.uk/downloads/registry_examination.pdf Forensic Analysis of the Windows Registry], Peter Davies, Computer Forensics: Coursework 2 (student paper)
+
|-
* [http://eptuners.com/forensics/A%20Windows%20Registry%20Quick%20Reference.pdf A Windows Registry Quick-Reference], Derrick Farmer, Burlington, VT.
+
| [[File:8-bb9320-ScrewRemoval.jpg| 300px ]]
 +
|-
 +
|}
  
* [http://www.sciencedirect.com/science?_ob=ArticleURL&_udi=B7CW4-4GX1J3B-1&_user=3326500&_rdoc=1&_fmt=&_orig=search&_sort=d&view=c&_acct=C000060280&_version=1&_urlVersion=0&_userid=3326500&md5=ab887593e7be6d5257696707886978f1 The Windows Registry as a forensic resource], Digital Investigation, Volume 2, Issue 3, September 2005, Pages 201--205.
+
<ol start="11">
 +
<li>Disconnect the ribbon cable connected to the LCD. Then using a pick separate the display from the main board.</li>
 +
</ol>
  
* [http://www.forensicfocus.com/downloads/forensic-analysis-windows-registry.pdf Forensic Analysis of the Windows Registry], Lih Wern Wong , School of Computer and Information Science, Edith Cowan University
+
{| border="1" cellpadding="2"
 +
|-
 +
| [[File:9-bb9320-ScreenRemoval.jpg| 300px ]]
 +
|-
 +
|}
  
* [http://www.sentinelchicken.com/research/registry_format/ The Windows NT Registry File Format], Timothy D. Morgan
+
<ol start="12">
 +
<li>The tear down is now complete</li>
 +
</ol>
  
==See Also==
+
{| border="1" cellpadding="2"
* [http://windowsir.blogspot.com/search/label/Registry Windows Incident Response Articles on Registry]
+
|-
* [http://www.answers.com/topic/win-registry Windows Registry Information]
+
| [[File:9-1-bb9320-TearDownComplete.jpg| 300px ]]
* [http://en.wikipedia.org/wiki/Windows_Registry Wikipedia Article on Windows Registry]
+
|-
[[Category:Bibliographies]]
+
|}
* [http://moyix.blogspot.com/search/label/registry Push the Red Button] — Articles on Registry
+
* [http://tech.groups.yahoo.com/group/win4n6/ Windows Forensics Mailing List]
+
* [http://samba.org/~jelmer/kregedit/ kregedit] - a KDE utility for viewing and editing registry files.
+
* [http://www.bindview.com/Services/RAZOR/Utilities/Unix_Linux/ntreg_readme.cfm ntreg] a file system driver for linux, which understands the NT registry file format.
+
* [http://www.beginningtoseethelight.org/ntsecurity/ Security Accounts Manager]
+
  
* http://www.opensourceforensics.org/tools/unix.html - Open Source Forensic Tools on Brian Carrier's website.
+
eMMC Removal
 +
 
 +
<ol start="1">
 +
<li>The eMMC is located beneath the heat shield directly above the Micro SD card slot.</li>
 +
</ol>
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[File:10-bb9320-EMMC-Location.jpg| 300px ]]
 +
|-
 +
|}
 +
 
 +
<ol start="2">
 +
<li>Place the main board in a stand or holder and position it approximately 2 1/2" - 3" inches away from a heat gun or device the blows super hot air.</li>
 +
</ol>
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[File:11-bb9320-HeatShield.jpg| 300px ]]
 +
|-
 +
|}
 +
 
 +
<ol start="3">
 +
<li>Monitoring the temperature the heat shield will come off easily between 190-200 Centigrade.</li>
 +
</ol>
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[File:12-bb9320-HeatShield.jpg| 300px ]] 13-bb9320-HeatShieldRemoved.jpg| 300px ]]
 +
|-
 +
|}
 +
 
 +
<ol start="4">
 +
<li>Continue working under the high heat. With the 9315/9320's I've worked on the eMMC has been ready to lift off of the main board using tweezers immediately after removing the heat shield.</li>
 +
</ol>
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[File:14-bb9320-EMMC-Removed.jpg| 300px ]]
 +
|-
 +
|}
 +
 
 +
<ol start="5">
 +
<li>Using liquid flux, or flux paste and a soldering iron clean the pads on the eMMC in preparation for a read</li>
 +
</ol>
 +
 
 +
{| border="1" cellpadding="2"
 +
|-
 +
| [[File:15-bb9320-EMMC-Cleanup.jpg| 300px ]]
 +
| [[File:16-bb9320-EMMC-Clean.jpg| 300px ]]
 +
|-
 +
|}
 +
 
 +
<ol start="6">
 +
<li>The eMMC is now ready to read using the appropriate adapter/programmer and software.</li>
 +
</ol>
 +
 
 +
At the time of this writing (2013OCT29) the eMMC that was removed in this example was read using an UP828 programmer via the "VBGA169E" adapter. The resulting image was then parsed via the CelleBrite Physical Analyzer (V. 3.8.5.108).

Revision as of 12:26, 30 October 2013

Tear Down

  1. Remove the back panel.
1-bb9320-BackPanelRemoved.jpg
  1. Remove the SIM and SD Memory Card.
  1. Using a torx-6 screw driver remove the 2 visible screws on the back of the phone.
2-bb9320-ScrewRemoval.jpg
  1. Remove the screen protector using a shim, guitar pick, or prying tool.
3-bb9320-ScreenRemoval.jpg
  1. Remove 2 torx-5 screws.
4-bb9320-ScrewRemoval.jpg
  1. Use the shim to detach the outer bezel/keyboard from the device.
5-bb9320-TopPlate.jpg 5-1-bb9320-TopPlate.jpg| 300px ]]
  1. Remove 4 additional torx-6 screws. The main board will now easily be separated from the back plate
6-bb9320-ScrewRemoval.jpg
  1. Peel off the vendor sticker.
7-bb9320-VendorPlate.jpg
  1. Remove the plastic cover protecting the track pad ribbon cable, and disconnect the track pad.
  1. Remove the final torx-4 screw located beneath the plastic protector, to remove the plastic keyboard overlay.
8-bb9320-ScrewRemoval.jpg
  1. Disconnect the ribbon cable connected to the LCD. Then using a pick separate the display from the main board.
9-bb9320-ScreenRemoval.jpg
  1. The tear down is now complete
9-1-bb9320-TearDownComplete.jpg

eMMC Removal

  1. The eMMC is located beneath the heat shield directly above the Micro SD card slot.
10-bb9320-EMMC-Location.jpg
  1. Place the main board in a stand or holder and position it approximately 2 1/2" - 3" inches away from a heat gun or device the blows super hot air.
11-bb9320-HeatShield.jpg
  1. Monitoring the temperature the heat shield will come off easily between 190-200 Centigrade.
12-bb9320-HeatShield.jpg 13-bb9320-HeatShieldRemoved.jpg| 300px ]]
  1. Continue working under the high heat. With the 9315/9320's I've worked on the eMMC has been ready to lift off of the main board using tweezers immediately after removing the heat shield.
14-bb9320-EMMC-Removed.jpg
  1. Using liquid flux, or flux paste and a soldering iron clean the pads on the eMMC in preparation for a read
15-bb9320-EMMC-Cleanup.jpg 16-bb9320-EMMC-Clean.jpg
  1. The eMMC is now ready to read using the appropriate adapter/programmer and software.

At the time of this writing (2013OCT29) the eMMC that was removed in this example was read using an UP828 programmer via the "VBGA169E" adapter. The resulting image was then parsed via the CelleBrite Physical Analyzer (V. 3.8.5.108).