Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Windows Forensics 2

Premium room

Learn about common Windows file systems and forensic artifacts in the file systems.

medium

70 min

38,840

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Introduction

We learned about Windows Forensics in the previous room and practiced extracting forensic artifacts from the Windows Registry. We learned about gathering system information, user information, files and folders accessed, programs run, and external devices connected to the system, all from the Windows registry.

However, the registry is not the only place where forensic artifacts are present. In this room, we will learn about forensic artifacts in other places. We will learn about the different file systems commonly used by Windows and where to look in these file systems when looking for artifacts. We will identify locations and artifacts to prove evidence of execution, file/folder usage or knowledge, and external device usage. We will also cover the basics of recovering deleted files. We will use Eric Zimmerman's tools (opens in new tab) to parse information present in the artifacts for most of this room. We already used Registry Explorer and ShellBags Explorer in the previous room. For some of the tasks, we will use Autopsy.

Answer the questions below
Follow the link and check out the Windows Forensics 1 room

Ready to learn Cyber Security?

The Windows Forensics 2 room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.