In computer forensics, SAM stands for Security Account Manager.
It’s a critical Windows database that stores information about local user accounts on a system.
What SAM contains
• Usernames of local accounts
• Password hashes (not plain-text passwords)
• Account-related security info (like account status)
Where it’s found
On Windows systems, the SAM database is stored at: C:\Windows\System32\Config\SAM
Why SAM matters in forensics
Forensic investigators use the SAM to:
• Identify local users on a machine
• Determine if password cracking is possible (using the hashes)
• Correlate user activity with login artifacts
• Support incident response and malware investigations
In computer forensics, SYSTEM refers to the Windows SYSTEM registry hive.
It’s one of the most important artifacts on a Windows machine.
⸻
What the SYSTEM hive contains
The SYSTEM hive stores:
• System configuration and hardware info
• Services and drivers (what runs at boot)
• Startup settings
• Mounted devices (USBs, drives, volume IDs)
• Control Sets (current, last known good, etc.) C:\Windows\System32\Config\SYSTEM
Why SYSTEM matters in forensics
Investigators use the SYSTEM hive to:
• Reconstruct boot history
• Identify connected storage devices (USB forensics)
• Determine which services/drivers were active
• Extract the Boot Key (SysKey) 🔑
That last one is crucial…
SYSTEM + SAM = 🔓
• The SYSTEM hive stores the SysKey
• The SAM hive stores encrypted password hashes
• You need SYSTEM to decrypt the SAM hashes
That’s why examiners always collect both.
Key forensic artifacts inside SYSTEM
• MountedDevices → USB & drive history
• Services → persistence mechanisms
• Select key → tells which ControlSet was active
• CurrentControlSet → live system configuration
🔐 SECURITY (Registry Hive)
What it is
The SECURITY hive stores local security policy information for the system. It’s tightly protected and mostly invisible during normal use.
What it contains
• Audit policies (what events Windows logs)
• User rights assignments
(who can log on locally, access the network, shut down the system, etc.)
• LSA secrets (sensitive encrypted data), such as:
• Cached domain credentials
• Service account passwords
• Network share credentials
• System-wide security settings
Why it matters in forensics
Investigators use SECURITY to:
• Determine who had elevated privileges
• Identify credential storage and reuse
• Understand logging behavior (what should have been logged)
• Detect persistence or lateral movement via service credentials
⚠️ Like SAM, SECURITY relies on the SYSTEM hive for decryption.
👤 NTUSER.DAT (Per-User Registry Hive)
What it is
NTUSER.DAT is the registry hive for an individual user.
Every user account has their own copy.
C:\Users\<username>\NTUSER.DAT
What it contains
• User preferences (desktop, UI settings)
• Recently opened files
• Program execution history
• Mapped network drives
• Application-specific data
• Explorer artifacts (MRUs, typed paths)
Why it matters in forensics
NTUSER.DAT is gold for user activity reconstruction:
• What programs the user ran
• What files they opened
• When activity occurred
• Which user did what
It directly ties actions to a specific account, unlike SYSTEM or SAM.
relative identifyer (in SAM hive) - it uniqueley identifies a user and can be matched to a username.
look for the largest data size
Think of the Windows Registry as the central brain + memory of a Windows system 🧠.
time zone settings
computer name
registard owner
windows
system 32
config
SAM
SECURITY
SOFTWARE
Use the registary viewer to view this
you can see 'mounted drives' on the systems registry.
every drive has its own unique signature (first 4 hex)
found at offset 440
this signature shows if the frive has been connected to another computer etc.
a registary hive where you can find everything to do with the user - user info
a registary hive - the origional stuff on the computer - the physical computer info such as computer name, time zone details
a registary hive - application data is found here
SAM can contain password hints that have been set up which may help encrpt further files on the computer
on the C drive under users
roaming
temp
local
can see the apps used on ghe device.
e.g. roaming could hold skype data
local holds torrent - bit torrent
cache history
A metadata descriptor used by the BitTorrent peer-to-peer (P2P) protocol to coordinate distributed file transfer.
From a forensic perspective, torrent artifacts indicate:
• Use or presence of BitTorrent software
• Intent or capability to download or distribute specific content
• Possible correlation to downloaded files via matching hashes
• A torrent file alone does not prove possession of the content
• It only proves possession of metadata describing the content
Peer-to-peer is a network model where each computer (“peer”) can act as both a client and a server, sharing data directly with other computers instead of going through one central server.
How that differs from “normal” downloads
• Normal (client–server):
You download a file from one central server.
• P2P:
You download small pieces of the same file from many other users at the same time.
Temporary stored data created to make systems and applications run faster — and it often preserves traces of past activity even after the original data is gone.
What cache can contain (forensic gold)
Depending on the app/system, cache may hold:
Web cache
• Visited URLs
• Page titles
• Images, videos, scripts
• Timestamps of access
➡️ Shows what was viewed, even if history was cleared
A way to download a file by getting little pieces of it from lots of other people’s computers instead of one central server.
Here’s the clean mental picture:
• The file (movie, game, Linux, whatever) is split into many small pieces
• Lots of people have different pieces
• Your computer grabs pieces from many of them at once
• At the same time, your computer shares the pieces it already has
That system is called BitTorrent, and it’s a type of P2P (peer-to-peer) sharing.
Why Program Files matters in forensics
Program Files helps investigators answer presence, capability, and timeline questions.
⸻
1. Proof of software installation
If a folder exists in Program Files, it usually means:
• The application was installed intentionally
• The installer ran with sufficient privileges
➡️ Stronger evidence than a shortcut or download alone
Example:
• C:\Program Files\qBittorrent\
➡️ Indicates the system was capable of torrenting
dodgy apps like "CCCleaner" or anything wipe etc which you can see this was downloaded.
other downloades apps can be seen, this could lead you down a different path as an analyst e.g., AI, website making etc.
i never bottle stuff up- i talk and seek support from my colleagues and managers.
if i feel stressed or upset, i always open up about it.
i have a good social life outside of work and i tend to leave work at the door.
i know that i will be supported here with regular screening and counsellors should i feel i need it.
i am resilient, naturally i have already been exposed
Deleted data is data the file system still knows about.
Carving is recovering data the file system has forgotten about.
File carving (file-system unaware)
What carving is
Carving recovers data by:
• Scanning raw disk space
• Ignoring the file system entirely
• Looking for known file signatures (headers/footers)
Example:
• JPEG starts with FFD8
• PDF starts with %PDF
When carving is used
Carving is used when:
• File system metadata is gone
• The file was deleted long ago
• The disk is partially damaged
• The file system is corrupted or wiped
Finding loose pages of a book in a dumpster and guessing which book they came from.
Deleted data recovery relies on surviving file system metadata, while carving reconstructs files from raw disk data when metadata no longer exists.
carving is the process you do to re-piece together fragmented deleted files.
sometimes a deleted file in intact where it is. sometimes it goes in to unallocated space but is split up into different sectors, like shards of smashed glass.
carving reads file headers and signatures and from this knows how big the file should be and what type of file it should be and pieces it all together as best it can.
its the de-fragmentation process
meta data stored here
determines what type of file it is.
this is a file signature in the header. and a set of bytes represent each different file type signature e.g. Zip Txt PDF etc
very useful in carving and hidden files .
if hidden and part of the signature is changed, the file will be corrupt and wont open. BUT you can go in Hex editor and change this back to open it.
a file footer is at the end of a file.
it shows you where the file ends and helps you judge what youve carved is complete and valid.
can show how much data belongs to the file when meta data is missing.
security accounts manager
AppData is in the C drive under users.
withij there you have temp and roaming and local.
you can find torrents in here and cache historty
windows
mac OS
linux
android
solaris
Chrome OS
Software that manages a computer’s hardware and software and provides a platform for running applications.
A file system is a method and data structure that an operating system uses to store, organize, and manage files and directories on storage devices (like hard drives, SSDs, or USB drives).
Key Points
1. Determines how data is named, stored, and retrieved.
2. Keeps track of where files are located on disk.
3. Examples: NTFS, FAT32, exFAT (Windows); HFS+, APFS (macOS); ext4, Btrfs (Linux).
file allocation table - a file system
a file system - extended file allocation table
new technology file system
apple file system
linnux - fourth extended file system
resilient file system - windows
a usb with software to plug into laptop to extract.
cant remove HD on some macs but not able to use bootable tools hence why they outsource
Child Abuse Image Database
child sexual abuse material
a type of cloud storage used
section 49 - an offence if password not given.
true crypt and bitlocker - need pword
passwords on other devices - may work on device you have.
passware
or look through Axiom, passwords can be stored
VFC - stored on browser can se passwords in clear text
NTAC as last resort.
using remote access - if this was used
In digital forensics, hash analysis is a fundamental technique used to verify, identify, and categorize digital data. Let’s break it down carefully.
run this whilst processing when also carving.
used to identify known files against databases
helps the analyst organise and prioritise evidence. like a file inventory.
hash matching is The process of comparing a file’s hash against a known hash database to see if it’s recognized.
ACPO
PACE
DPN
Data protection
attorney generals guide to disclosure
Code of ethics
A link file is a shortcut created by Windows to point to another file, folder, or program.
• It has the extension .lnk.
• Even if the original file is deleted, the LNK file can still exist, giving clues about what the user accessed.
Example:
• Document.docx exists in C:\Users\Alice\Documents\.
• Windows creates Document.docx.lnk on the Desktop.
• Clicking the shortcut opens the original document, but the LNK file stores metadata about it.
2. Why are link files important in forensics?
LNK files can provide investigators with evidence of user behavior, including:
1. File access information
• Path to the original file.
• Last time the file was accessed.
• File size.
2. User activity timeline
• Timestamps in the LNK file can help reconstruct when files or applications were opened.
3. Deleted file evidence
• Even if a file has been deleted, the LNK file may still exist, giving clues about its previous location.
4. Network and removable drive usage
• LNK files can indicate if a file was on a USB drive or network share.
Link files are shortcuts that store metadata about the original file. In forensics, they are valuable artifacts for reconstructing user activity, even if the original files are deleted.
A Jump List is a Windows feature that provides quick access to recently used files, folders, and programs.
• It’s linked to the taskbar or Start Menu: right-clicking an application icon often shows the Jump List.
• Jump Lists are stored as automatic files in the user profile with the extension .automaticDestinations-ms or .customDestinations-ms.
Jump Lists are valuable because they store evidence of file and program usage, including:
1. Recently accessed files
• Full path of files recently opened.
• Timestamps of last access.
2. Recently accessed programs
• Which applications the user ran, and when.
3. Deleted or moved files
• Even if a file was deleted, the Jump List may still contain a reference to it.
4. User activity reconstruction
• Investigators can use Jump Lists to build timelines of actions on a device.
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations
A Jump List is a Windows feature that tracks recently accessed files and programs. In digital forensics, it’s a key source of user activity evidence and can help reconstruct timelines, identify deleted files, and support investigations.
when a user opens up an application, prefetch stores the amount of times the application has been run, last time used etc.
1. What is a Prefetch file?
• Prefetch files are special Windows system files designed to speed up program startup.
• When a program runs for the first time, Windows creates a .pf file in the Prefetch folder: C:\Windows\Prefetch
• These files store information about the program’s executable and the files it uses so that future launches are faster.
Example:
• Running chrome.exe creates a Prefetch file: CHROME.EXE-12345678.pf
• The next time Chrome is opened, Windows uses the Prefetch data to load it faster.
Prefetch files are valuable because they reveal user activity and program execution, even if other evidence is deleted:
In digital forensics, Shell Bags are a very important Windows artifact used to track user interactions with folders. They can reveal which folders were accessed, created, or modified, even if the folders have been deleted.
• Shell Bags are Windows registry entries that store metadata about folders viewed in File Explorer.
• They record how folders are displayed and arranged, like icon size, window position, and view mode.
• Stored in the Windows Registry, typically under: HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags
HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\BagMRU
Example:
• If a user opens C:\Users\Alice\Documents\Projects in File Explorer, Windows creates a Shell Bag entry for that folder.
• Even if the folder is deleted, the Shell Bag may remain, showing that it existed and was accessed.
Shell Bags are valuable because they can reveal user activity and hidden evidence:
1. Folder existence
• Detect folders that may have been deleted.
2. Folder structure
• Shows the hierarchy of folders the user has accessed.
3. User activity timeline
• Accessed folders and their last viewed timestamps help reconstruct user actions over time.
4. Hidden or external drives
• If the user accessed USB drives or network shares, Shell Bags may record the folder paths.
5. Corroborating other artifacts
• Combine with Prefetch files, LNK files, and Jump Lists for a more complete timeline.
When you combine Prefetch files, LNK files, Jump Lists, and Shell Bags, you can reconstruct a very detailed timeline of user activity, including which files and folders were accessed, which programs were run, and when. Let’s break it down clearly:
5. Corroborating other artifacts
• Combine with Prefetch files, LNK files, and Jump Lists for a more complete timeline.
What they show:
• The original file path of shortcuts used.
• Timestamps of last access.
• Clues about deleted files (the shortcut may remain).
• Use in timeline:
• Shows what files the user opened or attempted to open.
What they show:
• Recently opened files and programs tied to a specific application.
• Timestamps of last access.
• References to deleted or moved files.
• Use in timeline:
• Reveals frequent or recent activity per application, helping establish usage patterns.
What they show:
• Programs that were executed.
• Run count and last run time.
• Path to the executable.
• Use in timeline:
• Confirms which applications were actually executed, even if the executable has been deleted.
What they show:
• Folders that were accessed, including deleted or hidden folders.
• Folder structure, view settings, and access timestamps.
• Use in timeline:
• Helps reconstruct the folder hierarchy the user navigated, even if the files inside are gone.
In digital forensics, WebCacheV01.dat (sometimes written as WebCacheV01) is a Windows system database that stores Internet Explorer (IE) and Microsoft Edge browsing activity, including cached web pages, cookies, and history. It’s a very important artifact for tracking user web activity.
C:\Users\<username>\AppData\Local\Microsoft\Windows\WebCache
Visited URLs / browsing history
• Cached web pages (local copies of sites visited)
• Cookies and session information
• File download metadata (sometimes shows downloaded file names and timestamps)
• Form data and autofill information (if saved by the browser)
Why it matters in forensics
You need the Boot Key to:
• Decrypt the SAM hive
• Extract NTLM hashes
• Recover LSA secrets
• Perform offline password cracking
This is why most tools start by asking for the SYSTEM hive — that’s where the Boot Key comes from.
found in system!
⸻
What the Windows Boot Key is (forensics context)
The Boot Key is a 128-bit key used to protect sensitive security data, mainly:
• SAM database (user password hashes)
• LSA secrets
• Cached credentials
Without the Boot Key, those items remain encrypted.
in short: The Windows Boot Key (SYSKEY) is a cryptographic key derived from the SYSTEM registry hive and used to decrypt the SAM and LSA secrets.
