Working with the Windows Registry Computer Club of the Sandhills November 12, 2012.

Slides:



Advertisements
Similar presentations
How to Look at ExBPA Files Exchange Tech Talk 10/04/2004.
Advertisements

Windows Under the Hood.
Services Course Windows Live SkyDrive Participant Guide.
Registry Forensics COEN 152 / 252. Registry: A Wealth of Information Information that can be recovered include:  System Configuration  Devices on the.
CSN11121/CSN11122 System Administration and Forensics Windows Registry & Timeline
Your Friend and Mine The Windows Registry. What is the Registry? ► Think of as a giant 411 switchboard ► Simple idea of centralized one-stop shopping.
Microsoft Office 2010 Office 2010 and Windows 7: Essential Concepts and Skills Mark Worden Instructor Use your spacebar or down arrow key to advance slides.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Network+ Guide to Networks, Fourth Edition Chapter 10 Netware-Based Networking.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
 Contents 1.Introduction about operating system. 2. What is 32 bit and 64 bit operating system. 3. File systems. 4. Minimum requirement for Windows 7.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
Operating System & Application Files BACS 371 Computer Forensics.
Working with the Windows XP Registry
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
OS and Application Files BACS 371 Computer Forensics.
Windows Tutorial 9 Maintaining Hardware and Software
Microsoft Office 2010 Office 2010 and Windows 7: Essential Concepts and Skills.
6. Configuring & Deploying the Desktop Thomas Lee Chief Technologist – QA.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
Chapter 4 Operating Systems and File Management. 4 Chapter 4: Operating Systems and File Management 2 Chapter Contents  Section A: Operating System Basics.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
1 Microsoft Windows Internals, 4 ed Chapter 4. Management Mechanisms The Registry 謝承璋 2008 年 05 月 07 日.
Tutorial 11 Installing, Updating, and Configuring Software
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Office 2013 and Windows 8: Essential Concepts and Skills Microsoft Access 2013.
计算机系 信息处理实验室 Lecture 6 Management Mechanisms
By Rashid Khan Lesson 10-From Here to There: Remote Installation of the Windows XP Professional Client.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Windows NT Chapter 13 Key Terms By Bill Ward NT Versions NT Workstation n A desktop PC that both accesses a network and works as a stand alone PC NT.
1 Chapter Overview Creating Drive and Folder Shares Using Distributed File System Installing Network Printers Administering Network Printers Managing Share.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Lesson 13: Configuring Shared Resources
IST 222 Day 3. Homework for Today Take up homework and go over Go to Microsoft website and check out their hardware compatibility list.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 7 Under the Windows Desktop McGraw-Hill.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
ACCESSDATA® FORENSICS Windows 7 Registry Introduction
Office 2013 and Windows 8: Essential Concepts and Skills Microsoft Office 2013.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 7 Under the Windows Desktop McGraw-Hill.
Registry Forensics COEN 152 / 252. Registry: A Wealth of Information Information that can be recovered include:  System Configuration  Devices on the.
THE WINDOWS OPERATING SYSTEM Computer Basics 1.2.
Data-information stored in files on the disks and CDs in your computer system Why should we save a file when we create it on the computer?
Virtual Machines Module 2. Objectives Define virtual machine Define common terminology Identify advantages and disadvantages Determine what software is.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Describe applications and services. Objective Course Weight 5%
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows Forensic MD Saquib Nasir Khan (JONK) DEA- Data64
Windchill WorkGroup Manager (WGM) for Inventor installation
Nat 4/5 Computing Science Software
Mario Tayah and Jim Fawcett CSE 775 – Distributed Objects Spring 2007
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
FTP - File Transfer Protocol
Under the Windows Desktop
Tutorial 13 Windows Registry.
Understanding Operating System Configurations
Network Services.
Office 2010 and Windows 7: Essential Concepts and Skills
Windows Internals Brown-Bag Seminar Chapter 1 – Concepts and Tools
This is a typical Windows user desktop
Windows Registry: Introduction
Designing IIS Security (IIS – Internet Information Service)
Instructor Materials Chapter 5: Windows Installation
Windows Operating System
Presentation transcript:

Working with the Windows Registry Computer Club of the Sandhills November 12, 2012

Registry Definition The registry was developed to overcome the restrictions of the INI and REG.DAT files. The registry was developed to overcome the restrictions of the INI and REG.DAT files. The registry is composed of two pieces of information: The registry is composed of two pieces of information: System-Wide Information – This is data about software and hardware settings. This information tends to be apply to all users of the computer. System-Wide Information – This is data about software and hardware settings. This information tends to be apply to all users of the computer. User Specific Information – This is data about an individual configuration. This information is specific to a users profile. User Specific Information – This is data about an individual configuration. This information is specific to a users profile.

Registry Definition The Microsoft Computer Dictionary defines the registry as: The Microsoft Computer Dictionary defines the registry as: A central hierarchical database used in the Microsoft Windows family of Operating Systems to store information necessary to configure the system for one or more users, applications and hardware devices. A central hierarchical database used in the Microsoft Windows family of Operating Systems to store information necessary to configure the system for one or more users, applications and hardware devices. The registry contains information that Windows continually references during operation, such as profiles for each user, the applications installed on the computer and the types of documents that each can crate, property sheet settings for folders and application icons, what hardware exists on the system and the ports that are being used. The registry contains information that Windows continually references during operation, such as profiles for each user, the applications installed on the computer and the types of documents that each can crate, property sheet settings for folders and application icons, what hardware exists on the system and the ports that are being used.

Details The registry is a database that is used by all windows operating systems that followed Win95. The registry is a database that is used by all windows operating systems that followed Win95. The registry is used by the Windows OS to store hardware and software configuration information, user preferences and setup information. The registry is used by the Windows OS to store hardware and software configuration information, user preferences and setup information. A healthy registry is essential for proper windows performance and function, this is why the registry is usually attacked by viruses and other malicious software. A healthy registry is essential for proper windows performance and function, this is why the registry is usually attacked by viruses and other malicious software.

Registry vs. File System The registry is analogous to a file system. The registry is analogous to a file system. File system: Folders Folders Files FilesRegistry: Keys Keys Keys have inside them either other keys or name/value pairs which correspond to object name and content. Keys have inside them either other keys or name/value pairs which correspond to object name and content.

Registry Content The registry holds critical information about the system, the users of the system, and installed applications: The registry holds critical information about the system, the users of the system, and installed applications: Operating System version number, build number, and registered user. Operating System version number, build number, and registered user. Information for every properly installed application, Information for every properly installed application, Information about the computers processor type and system memory. Information about the computers processor type and system memory. User-specific information (home directory, app. preferences) User-specific information (home directory, app. preferences) Security information such as user account names. Security information such as user account names. Installed services Installed services Mapping from file names to programs/executables. Mapping from file names to programs/executables. Mapping network addressees to host machine names. Mapping network addressees to host machine names.

Registry contents: Security Information the registry includes: System Configuration System Configuration Devices on the System Devices on the System User Names User Names Personal Settings and Browser Preferences Personal Settings and Browser Preferences Web Browsing Activity Web Browsing Activity Files Opened Files Opened Programs Executed Programs Executed Passwords Passwords

Windows 9x Registry FilenameLocationContent system.datC:\Windows Protected storage area for all users All installed programs and their settings System settings user.dat If there are multiple user profiles, each user has an individual user.dat file in windows\profiles\user account C:\Windows Most Recently Used (MRU) files User preference settings

Modern Windows Registry FilenameLocationContent ntuser.dat If there are multiple user profiles, each user has an individual user.dat file in windows\profiles\user account \Documents and Settings\user account Protected storage area for user Most Recently Used (MRU) files User preference settings Default\Windows\system32\config System settings SAM\Windows\system32\config User account management and security settings Security\Windows\system32\config Security settings Software\Windows\system32\config All installed programs and their settings System\Windows\system32\config System settings

Windows Security and Relative ID The Windows Registry utilizes a alphanumeric combination to uniquely identify a security principal or security group. The Windows Registry utilizes a alphanumeric combination to uniquely identify a security principal or security group. The Security ID (SID) is used to identify the computer system. The Security ID (SID) is used to identify the computer system. The Relative ID (RID) is used to identity the specific user on the computer system. The Relative ID (RID) is used to identity the specific user on the computer system. The SID appears as: The SID appears as: S S

Registry Structure

Registry has five top level branches or Hives: Registry has five top level branches or Hives: HKEY_CLASSES_ROOT HKEY_CLASSES_ROOT COM server info, file associations, shortcuts COM server info, file associations, shortcuts HKEY_CURRENT-USER HKEY_CURRENT-USER Logged in user name, desktop, start menu Logged in user name, desktop, start menu HKEY_LOCAL_MACHINE HKEY_LOCAL_MACHINE Hardware, software, preferences for all users Hardware, software, preferences for all users HKEY_USERS HKEY_USERS Individual preferences for each user, represented by Security ID (SID) Individual preferences for each user, represented by Security ID (SID) HKEY_CURRENT_CONFIG HKEY_CURRENT_CONFIG Links to part of HKEY_LOCAL_MACHINE for current hardware Links to part of HKEY_LOCAL_MACHINE for current hardware HKEY_DYN_DATA HKEY_DYN_DATA Links to part of HKEY_LOCAL_MACHINE for PlugAndPlay Links to part of HKEY_LOCAL_MACHINE for PlugAndPlay

Registry Value Types REG_BINARY REG_BINARY Raw binary data Raw binary data REG_DWORD REG_DWORD 32 bit integers – often representing bools 32 bit integers – often representing bools REG_SZ REG_SZ string string REG_EXPAND_SZ REG_EXPAND_SZ Expandable string Expandable string REG_MULTI_SZ REG_MULTI_SZ Container for null separated strings Container for null separated strings

Exporting and Importing In RegEdit select a key In RegEdit select a key File Export File Export Provide filespec info in resulting save dialog Provide filespec info in resulting save dialog

Using Regedit

Using CCleaner