Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Expediting Registry Analysis

Premium room

This room explores different tools used to expedite analysis of registry data during investigation.

medium

120 min

4,782

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

In Windows Forensics 1, we learned about where we can find the registry hives and the different artefacts present in these hives. In this room, we will build on that information and learn more about data acquisition and analysis, as during an incident. Therefore, we will not discuss the different artefacts, the information on those artefacts, and where to find them. Instead, we will focus on leveraging the knowledge of these artefacts to perform incident analysis.

Learning Objectives

In this room, we will learn:

  • How to acquire a live and cold system registry hive.
  • The tools that can be used to analyse and parse the data in the registry hives.
  • The kind of questions that can be answered by analysing a system's registry.

Prerequisites

Before continuing, it is highly recommended that you complete the Level 1 and Level 2 paths, especially the following rooms:

Room

Before moving forward, start the lab by clicking the Start Machine button. It will take 3-5 minutes to load properly. The VM will be accessible on the right side of the split screen. If the VM is not visible, use the blue Show Split View button at the top of the page. Additionally, we will provide you with credentials that you may use if you prefer to connect from your own connected machine.

THM Key Credentials
Username administrator
Password thm_4n6
IP MACHINE_IP

Scenario

Anna, the lead at Deer Inc., is investigating suspicious activity on one of the systems. She had been tipped off due to a new user creation activity on the machine. For further analysis, she decided to pull the registry data from the system to answer some questions and identify the scope of the incident. Let's help Anna verify the following information by analysing the attached :

  • Information that can be used to identify the system.
  • User accounts on the system, as well as any suspicious user account.
  • Any password resets or wrong password inputs.
  • Networks that the system connected to in the past.

Answer the questions below
I have completed the prerequisites for the room.

Ready to learn Cyber Security?

The Expediting Registry Analysis room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.