Difference between pages "OLE Compound File" and "Windows Shadow Volumes"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(File signature)
 
(Shadow Volumes in depth)
 
Line 1: Line 1:
The '''Object Linking and Embedding (OLE) Compound File (CF)''' is used in other file formats as its underlying container file.
+
{{expand}}
It allows data to be stored in multiple streams.
+
  
The OLECF is also known as:
+
==Volume Shadow Copy Service==
* Compound Binary File (current name used by [[Microsoft]])
+
Windows has included the Volume Shadow Copy Service in it's releases since Windows XP.  The Shadow Copy Service creates differential backups periodically to create restore points for the user.  Windows 7 Professional and Ultimate editions include tools to work with and manage the Volume Shadow Copy Service, including the ability to [[mount shadow volumes on disk images]].
* Compound Document File (name used by [[OpenOffice]])
+
* OLE2 file
+
  
== MIME types ==
+
In Windows 8 the shadow volumes seem to have been superseded by File History. For now it looks like it uses similar structures as its predecessors.
  
Because the OLECF by itself is just a container it does not use a mime type.
+
== Also see ==
A mime type assigned to an OLECF refers to its contents.
+
* [[Windows]]
 +
* [[Windows File History | File History]]
 +
* How to: [[Mount shadow volumes on disk images]]
  
== File signature ==
+
== External Links ==
  
The OLECF has the following file signature:
+
=== How to analyze Shadow Volumes ===
<pre>
+
* [http://computer-forensics.sans.org/blog/2008/10/10/shadow-forensics/ VISTA and Windows 7 Shadow Volume Forensics], by [[Rob Lee]], October 2008
d0 cf 11 e0 a1 b1 1a e1
+
* [http://windowsir.blogspot.ch/2011/01/accessing-volume-shadow-copies.html Accessing Volume Shadow Copies], by [[Harlan Carvey]], January 2011
</pre>
+
* [http://windowsir.blogspot.ch/2011/01/more-vscs.html More VSCs], by [[Harlan Carvey]], January 2011
 +
* [http://journeyintoir.blogspot.ch/2011/04/little-help-with-volume-shadow-copies.html A Little Help with Volume Shadow Copies], by [[Corey Harrell]], April 2011
 +
* [http://toorcon.techpathways.com/uploads/VolumeShadowCopyWithProDiscover-0511.pdf Volume Shadow Copy with ProDiscover], May 2011
 +
* [http://windowsir.blogspot.ch/2011/09/howto-mount-and-access-vscs.html HowTo: Mount and Access VSCs], by [[Harlan Carvey]], September 2011
 +
* [http://computer-forensics.sans.org/blog/2011/09/16/shadow-timelines-and-other-shadowvolumecopy-digital-forensics-techniques-with-the-sleuthkit-on-windows/ Shadow Timelines And Other VolumeShadowCopy Digital Forensics Techniques with the Sleuthkit on Windows], by [[Rob Lee]], September 2011
 +
* [http://journeyintoir.blogspot.ch/2012/01/ripping-volume-shadow-copies.html Ripping Volume Shadow Copies – Introduction], by [[Corey Harrell]], January 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-practitioner-method.html Ripping VSCs – Practitioner Method], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-practitioner-examples.html Ripping VSCs – Practitioner Examples], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-developer-method.html Ripping VSCs – Developer Method], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/ripping-vscs-developer-examples.html Ripping VSCs – Developer Examples], by [[Corey Harrell]], February 2012
 +
* [http://journeyintoir.blogspot.ch/2012/02/examining-vscs-with-gui-tools.html Examining VSCs with GUI Tools], by [[Corey Harrell]], February 2012
 +
* [http://dfstream.blogspot.ch/2012/03/vsc-toolset-gui-tool-for-shadow-copies.html VSC Toolset: A GUI Tool for Shadow Copies], by [[Jason Hale]], March 2012
 +
* [http://encase-forensic-blog.guidancesoftware.com/2012/06/examining-volume-shadow-copies-easy-way.html Examining Volume Shadow Copies – The Easy Way!], by [[Simon Key]], June 2012
 +
* [http://justaskweg.com/?p=351 Getting Ready for a Shadow Volume Exam], by [[Jimmy Weg]], June 2012
 +
* [http://justaskweg.com/?p=466 Mounting Shadow Volumes], by [[Jimmy Weg]], July 2012
 +
* [http://justaskweg.com/?p=518 Examining the Shadow Volumes with X-Ways Forensics], by [[Jimmy Weg]], July 2012
 +
* [http://justaskweg.com/?p=710 “Weg, I’m afraid that I don’t have VMware. How do I Examime Shadow Volumes?”], by [[Jimmy Weg]], August 2012
 +
* [http://sandersonforensics.com/forum/content.php?168-Reconnoitre "Examining shadow copies with Reconnoitre (and without vssadmin), it's as easy as 1, 2, 3"], by [[Paul Sanderson]], January 2013
  
For beta version the following signature was used:
+
=== Shadow Volumes in depth ===
<pre>
+
* [http://www.qccis.com/docs/publications/WP-VSS.pdf Reliably recovering evidential data from Volume Shadow Copies in Windows Vista and Windows 7], by [[James Crabtree]] and [[Gary Evans]], 2010
0e 11 fc 0d d0 cf 11 0e
+
* [http://forensic4cast.com/2010/04/19/into-the-shadows/ Into The Shadows] and [http://www.forensic4cast.com/2010/04/presentation-into-the-shadows/ Presentation], by [[Lee Whitfield]], April 2010
</pre>
+
* [https://googledrive.com/host/0B3fBvzttpiiSZDZXRFVMdnZCeHc/Volume%20Shadow%20Snapshot%20(VSS)%20format.pdf Volume Shadow Snapshot format], by the [[libvshadow|libvshadow project]], March 2011
 +
* [https://googledrive.com/host/0B3fBvzttpiiSZDZXRFVMdnZCeHc/Paper%20-%20Windowless%20Shadow%20Snapshots.pdf Windowless Shadow Snapshots - Analyzing Volume Shadow Snapshots (VSS) without using Windows] and [http://www.basistech.com/about-us/events/open-source-forensics-conference/ OSDFC 2012] [https://googledrive.com/host/0B3fBvzttpiiSZDZXRFVMdnZCeHc/Slides%20-%20Windowless%20Shadow%20Snapshots.pdf Slides], by [[Joachim Metz]], October 2012
  
The OLECF has no distinct footer.
+
=== Other ===
 
+
* [http://lanmaster53.com/talks/#hack3rcon2 Lurking in the Shadows – Hack3rcon II]
== Contents ==
+
* [http://pauldotcom.com/2012/10/volume-shadow-copies---the-los.html Volume Shadow Copies - The Lost Post], [[Mark Baggett]], October 2012
 
+
The OLECF uses a FAT-like file system to define blocks that are assigned to the stream using multiple allocation tables.
+
It uses a directory structure to define the name of the streams.
+
 
+
The OLECF is used to store:
+
* [[Microsoft Office]] 97-2003 documents:
+
** [[Word Document (DOC)]]
+
** [[Excel Spreadsheet (XLS)]]
+
** [[Powerpoint Presentation (PPT)]]
+
* MSN (Toolbar) (C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Microsoft\MSNe\msninfo.dat)
+
* [[Jump Lists]]
+
* StickyNotes.snt
+
* [[Thumbs.db]]
+
* Windows Installer (.msi) and patch file (.msp)
+
 
+
== External Links ==
+
* [http://download.microsoft.com/download/0/B/E/0BE8BDD7-E5E8-422A-ABFD-4342ED7AD886/WindowsCompoundBinaryFileFormatSpecification.pdf Compound Binary File Specification], by [[Microsoft]]. Be warned this file contains at least one error: the directory entry name length is a size in bytes not in characters.
+
* [http://msdn.microsoft.com/en-us/library/dd942138.aspx MS-CFB: Compound File Binary File Format], by [[Microsoft]]
+
* [http://www.openoffice.org/sc/compdocfileformat.pdf Microsoft Compound Document File Format], by OpenOffice.org
+
* [https://googledrive.com/host/0B3fBvzttpiiSS0hEb0pjU2h6a2c/OLE%20Compound%20File%20format.pdf OLE Compound File format specification], by the [[libolecf|libolecf project]]
+
  
 
== Tools ==
 
== Tools ==
* [[libolecf]]
+
* [[EnCase]] with VSS Examiner Enscript (available from the downloads section of the GSI Support Portal)
* [http://www.mitec.cz/ssv.html MiTec Structured Storage Viewer]
+
* [[libvshadow]]
 +
* [[ProDiscover]]
 +
* [http://www.shadowexplorer.com/ ShadowExplorer]
 +
* [http://dfstream.blogspot.ch/p/vsc-toolset.html VSC Toolset]
 +
* [[X-Ways AG|X-Ways Forensics]]
 +
* [http://sandersonforensics.com/forum/content.php?168-Reconnoitre Reconnoitre]
  
[[Category:File Formats]]
+
[[Category:Volume Systems]]

Revision as of 08:47, 2 February 2014

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Contents

Volume Shadow Copy Service

Windows has included the Volume Shadow Copy Service in it's releases since Windows XP. The Shadow Copy Service creates differential backups periodically to create restore points for the user. Windows 7 Professional and Ultimate editions include tools to work with and manage the Volume Shadow Copy Service, including the ability to mount shadow volumes on disk images.

In Windows 8 the shadow volumes seem to have been superseded by File History. For now it looks like it uses similar structures as its predecessors.

Also see

External Links

How to analyze Shadow Volumes

Shadow Volumes in depth

Other

Tools