Getting Started with Magnet AXIOM - File System and Registry

Magnet Forensics
1 Jun 201809:29

Summary

TLDRIn this video, Jamie McQuaid from Magnet Forensics introduces viewers to analyzing file systems and registry views in Magnet Axiom. Key features highlighted include source linking, navigating between views, and decoding data. The video demonstrates how to access raw file details, use the built-in SQLite viewer for mobile devices, and filter artifacts for specific users or folders. It also showcases the registry view and the ability to export data for further analysis.

Takeaways

  • 😀 Jamie McQuaid from Magnet Forensics introduces a tutorial on using Magnet Axiom for file system and registry analysis.
  • 🔍 The video demonstrates how to navigate from artifacts to the file system view in Magnet Axiom, highlighting the source and location of artifacts.
  • 💾 It showcases the ability to view raw file system details such as MAC times and cluster sizes, as well as raw hex and text data.
  • 🔎 The script explains the decoding feature in Magnet Axiom, which attempts to decode highlighted data into readable formats like ASCII, base64, unicode, or timestamps.
  • 📊 The tutorial includes a walkthrough of viewing SQLite databases natively within Axiom, including the ability to open and preview tables and data.
  • 📱 The video mentions the utility of Axiom's native viewers for mobile device data, such as SQLite databases and plist files for iOS devices.
  • 🗂️ It discusses the capability to perform recursive searches across all subfolders within a user's profile or other specified folders.
  • 📈 The script highlights the feature to view related artifacts for a specific file or folder, which can be useful for focusing analysis on particular user activity.
  • 🔗 The video explains how to use source linking to quickly navigate between the file system and registry views within Axiom.
  • 🛠️ It touches on the ability to export registry hives or other data from Axiom for further analysis using dedicated registry tools outside the platform.

Q & A

  • What is the main focus of the video presented by Jamie McQuaid?

    -The main focus of the video is to provide guidance on using Magnet Axiom for analysis in the file system and registry views, including traversing between different views and utilizing the tool's features for in-depth analysis.

  • How does Magnet Axiom help in navigating to the file system from an artifact?

    -Magnet Axiom allows users to navigate to the file system from an artifact by clicking on a link that takes them directly to the SQLite database for that specific artifact, displaying the file system details and raw hex and text data.

  • What additional feature does Magnet Axiom provide for analyzing raw data?

    -Magnet Axiom provides a feature that attempts to decode highlighted data in the raw hex and text view, such as strings, timestamps, and various data types, to assist in the analysis process.

  • Can Magnet Axiom open SQLite databases natively within the tool?

    -Yes, Magnet Axiom has a built-in SQLite viewer that allows users to open and view the contents of an SQLite database directly within the tool, such as tables and their associated data.

  • What is the purpose of the native plist viewer in Magnet Axiom?

    -The native plist viewer in Magnet Axiom is used to view and analyze property list (plist) files from iOS devices, providing details such as IMEI, installed applications, phone numbers, and other relevant information.

  • How can users manipulate data in the file system view within Magnet Axiom?

    -Users can manipulate data in the file system view by selecting options such as 'All Subfolders' to get a recursive view of all files within a folder or user profile, which is useful for timelining activities or filtering data.

  • What does the 'View Related Artifacts' feature in Magnet Axiom do?

    -The 'View Related Artifacts' feature in Magnet Axiom allows users to quickly filter and display artifacts related to a specific file or folder, narrowing down the analysis to a particular user or area of interest within a case.

  • How does Magnet Axiom handle the analysis of registry data?

    -Magnet Axiom provides a dedicated registry view where users can analyze registry hives and artifacts. It also offers source linking to directly navigate to the registry view from an artifact, simplifying the process of locating and analyzing registry data.

  • What is the significance of the rot13 encoding mentioned in the video?

    -Rot13 is a simple letter substitution cipher used by Microsoft to store certain data in the registry. Magnet Axiom automatically translates this encoded data, making it readable and easier for analysts to understand the content.

  • Can users export data from Magnet Axiom for further analysis using other tools?

    -Yes, users can export data from Magnet Axiom by right-clicking and saving files out of the tool, allowing for additional analysis using dedicated registry or other forensic tools outside of Axiom.

  • What is the benefit of the source linking feature in Magnet Axiom?

    -The source linking feature in Magnet Axiom allows for quick navigation between different views, such as the file system and registry views, by providing a direct link to the exact location of the data, saving time and improving efficiency in the analysis process.

Outlines

00:00

🔍 Exploring File System and Registry Views in Magnet Axiom

Jamie McQuaid from Magnet Forensics introduces viewers to the capabilities of Magnet Axiom for digital forensics. The tutorial focuses on navigating through file systems and registry views to perform analysis. Starting with artifacts, Jamie demonstrates how to access the file system of a Windows 7 computer by clicking on a link, which takes the user to the SQLite database associated with a specific artifact. The video showcases detailed file system information, including MAC times and cluster sizes, and the ability to view and decode raw hex and text data. The built-in SQLite viewer within Axiom allows users to preview and analyze database files directly within the platform. Additionally, the video highlights the utility of the native viewer for mobile device databases and plist files from iOS devices, emphasizing the versatility of Axiom's file system analysis tools.

05:02

🖥️ Advanced File System and Registry Analysis Techniques

Continuing the tutorial, Jamie McQuaid delves into more advanced techniques for analyzing file systems and registry views in Magnet Axiom. The video explains how to use the platform's search functionality to recursively view all files within a folder or drive, which is particularly useful for timeline analysis. The feature to view related artifacts for a specific file or folder is highlighted, allowing users to filter and focus on relevant data, such as browsing activity or chats associated with a particular user profile. The tutorial also covers the dedicated registry view, where users can examine registry hives and artifacts, such as user assist data. Jamie demonstrates the source linking feature that enables users to quickly navigate between the file system and registry views, streamlining the analysis process. The video concludes with a demonstration of how to export data for further analysis using external tools, showcasing the comprehensive capabilities of Magnet Axiom for digital forensic investigations.

Mindmap

Keywords

💡Magnet Axiom

Magnet Axiom is a digital forensics platform designed for investigators to analyze and review digital evidence. In the video, it is the primary tool used to demonstrate how to navigate and analyze data from various sources such as file systems and registries. The script illustrates its use by showing how to access and interpret data from an artifact, highlighting its importance in the digital forensics process.

💡Artifacts

In the context of digital forensics, artifacts refer to pieces of data, such as files, logs, or other digital evidence, that can be analyzed to understand user activity or system behavior. The video script mentions artifacts as the starting point for analysis in Magnet Axiom, emphasizing their role in providing a structured approach to evidence examination.

💡File System

The file system is the method by which a computer stores, organizes, and manages files and their data. The script discusses how to use Magnet Axiom to traverse the file system of a Windows 7 computer, demonstrating the ability to access and analyze file metadata, such as MAC times (Modified, Accessed, Created) and cluster size, which are crucial for understanding file history and integrity.

💡Registry Views

Registry views in Windows operating systems are databases that store configuration settings and options. The video script explains how to use Magnet Axiom to analyze the registry views, which is important for understanding system and application settings that can be critical in a forensic investigation.

💡Hex and Text

Hex and text refer to the hexadecimal and ASCII representations of data, which are fundamental in digital forensics for understanding the raw content of files. The script describes how Magnet Axiom allows users to view and decode hex and text data from a file, which can be useful for uncovering hidden or encoded information.

💡SQLite Database

SQLite is a lightweight database format often used in applications for storing data. The video script mentions a SQLite database as an example of a file type that can be analyzed within Magnet Axiom. It demonstrates the ability to view and interpret the contents of a SQLite database, which is relevant for investigations involving application data.

💡Plist Viewer

Plist (property list) files are used by Apple operating systems to store settings and preferences. The script highlights Magnet Axiom's plist viewer, which allows investigators to examine plist files from iOS devices, providing insights into device configurations and application data.

💡Source Linking

Source linking is a feature in Magnet Axiom that enables users to quickly navigate between different views and data sources, such as from an artifact to its location in the file system or registry. The video script uses source linking as a demonstration of how to efficiently move between different data perspectives within an investigation.

💡User Artifacts

User artifacts are data points specific to a user's activity on a system. The script discusses how to filter and view artifacts related to a particular user, such as those found in a user's profile folder. This capability is crucial for narrowing down the scope of an investigation to a specific user's actions.

💡Registry Hives

Registry hives are large binary files that make up the Windows Registry, containing system and application settings. The video script explains how to access and analyze registry hives in Magnet Axiom, which is essential for understanding the configuration and operation of the Windows system.

Highlights

Introduction to Magnet Axiom for file system and registry views analysis.

Navigating to the file system view from artifacts.

Automatic linking to the file system view for a specific artifact.

Viewing raw file system details such as MAC time and cluster size.

Decoding raw hex and text data within a file.

Highlighting and decoding strings, timestamps, and other data types.

Viewing a SQLite database natively within Axiom.

Previewing tables and data within a SQLite database.

Opening a database with a native viewer for deeper analysis.

The utility of the native SQLite viewer for mobile device databases.

Accessing and viewing plist files for iOS devices.

Exploring the folder structure and manifest for iOS devices.

Manipulating data in the file system with recursive views.

Sorting and filtering files for timeline analysis.

Viewing related artifacts for a specific user or folder.

Switching between file system and registry views.

Using source linking to navigate to the registry view.

Analyzing user assist activity and RAM capture tool references in the registry.

Deciphering rot13 encoded data in the registry.

Exporting registry hives for additional analysis with dedicated tools.

Concluding remarks and thanks for watching.

Transcripts

play00:04

hello everyone my name is Jamie McQuaid

play00:06

from magnet forensics and today we've

play00:08

got a couple of quick videos to help you

play00:10

get started with magnet axiom in this

play00:12

video we're gonna talk about doing some

play00:15

analysis in the file system of registry

play00:16

views using axiom traversing between the

play00:20

different views here so normally people

play00:22

start with the the artifacts and we've

play00:24

last video was on the artifacts and you

play00:26

can see I've got a Google search up here

play00:28

with the artifacts as I mentioned

play00:30

previously you we always list the source

play00:32

and location for all the artifacts that

play00:34

we have here so what I can do is if I

play00:36

want to actually go to the file system

play00:37

for this given artifact I could just

play00:39

click on this link and you see this is

play00:41

for a Windows 7 computer it'll take me

play00:43

to the history sequel Lite database for

play00:46

that that exact artifact so we click on

play00:49

that we can see it took me to the the

play00:52

drop down took me automatically to the

play00:54

file system view and automatically if I

play00:56

scroll up here took me to the Windows 10

play00:58

PC C and down on the partition all the

play01:01

way to the default folder and there's

play01:03

that history database so I can look at

play01:05

the raw details of it this is just the

play01:08

file system details you get the Mac time

play01:10

so you get cluster size and all that

play01:13

fine details from NTFS but if we also

play01:16

look a little bit further down you get

play01:18

the raw hex and text for anything now

play01:21

you can see that took us to the start of

play01:22

the hex and text of that that file and

play01:26

nice thing with the the hex and text

play01:29

there if I bring this over a little bit

play01:30

better you could go through and decode

play01:33

some of that data as well now this is a

play01:35

sequel Lite database so there's nothing

play01:36

too exciting to decode and the raw hex

play01:39

in text but if I start scrolling through

play01:41

here and start highlighting data you can

play01:43

see a little bit further down it will

play01:45

try to decode that for us as well so

play01:47

it'll try to decode strings or

play01:49

timestamps for us so as I highlight

play01:51

it'll try to do some ASCII base64

play01:54

unicode or any other types of data you

play01:57

might have there but it'll also do

play01:59

timestamps so say you find timestamps

play02:01

that we don't pull as an artifact in the

play02:04

the raw metadata of a file you just

play02:05

start highlighting it and we'll try to

play02:07

decode what that time

play02:09

now that's not a valid timestamp

play02:10

obviously but you can see we tried to

play02:12

decode it there as hfs+ or UNIX 32-bit

play02:16

timestamp there which obviously gave us

play02:18

an incorrect one but you can see how

play02:20

that that works quite easily there so as

play02:23

you highlight it'll try to decode that

play02:25

data as best it can for you which is a

play02:27

nice little feature but this is a sequel

play02:30

Lite database if I scroll back up to the

play02:31

hex and text you can see it starts with

play02:32

there's the sequel Lite header so we

play02:35

could actually view that sequel Lite

play02:36

database natively inside axiom all you

play02:39

need to do is you see this little icon

play02:41

that it indicates it's a single light

play02:42

database I can double click on that

play02:44

it'll open up on our sequel Lite viewer

play02:47

and if I take a look there is the the

play02:50

tables here there's the url's table and

play02:52

if I take a look over here we can

play02:55

actually start seeing the URLs the title

play02:57

for for that the database visit time all

play03:01

that you get the visits table as well

play03:03

you get the visit source table this

play03:05

one's empty but you get the idea that we

play03:07

can actually take a look at that now

play03:09

this isn't meant to be a deep dive

play03:11

viewer for our analysis tool for sequel

play03:15

a it's just meant to preview it for you

play03:16

if you wanted to actually dive a little

play03:18

bit deeper and wanted to use another

play03:19

tool to do that if I go back outside the

play03:22

sequel Lite viewer I get very easily

play03:25

going a little too far up here so let me

play03:27

go to the default one and if I go down

play03:30

to the actual history database I could

play03:32

right-click on this and I can see that

play03:34

that file out or because it's a database

play03:37

I can open the database with and I can

play03:39

choose to open it in any native view or

play03:41

if you've got something sitting on your

play03:42

examination machine that you wanted to

play03:45

use take a little bit closer look

play03:47

through that so again nice sequel Lite

play03:50

viewer built right into it this works

play03:52

really well for mobile devices as well

play03:54

as the the chrome sugilite databases but

play03:57

there's a lot of sequent databases on

play03:58

mobile devices so that that native

play04:01

viewer can be really helpful we also

play04:04

have a plist viewer for iOS devices so

play04:06

if I get out of the windows computer

play04:08

which will have no P lists in it

play04:11

we do have there's an iPhone in here so

play04:14

if I take a look at the iPhone here I

play04:16

can see and look at any P lists as well

play04:19

so right off the top here we've got an

play04:21

info.plist

play04:22

that if I wanted to look through I could

play04:24

easily get some some details from the

play04:26

info dot plist file and you can see this

play04:29

is admins phone you get the IMEI there

play04:32

some details on the installed

play04:34

applications phone number and all of

play04:36

those details you would normally expect

play04:38

to find in a P list so again nice little

play04:41

native viewer in the file system there

play04:43

too to take a look at it and you can see

play04:45

we've got the whole a folder structure

play04:48

shown through there

play04:49

either through the the standard way or

play04:52

the interpreted way through the manifest

play04:54

for iOS devices as well so lots of

play04:58

different options there another weight

play04:59

we could actually manipulate data in the

play05:02

in the file system here is if I move

play05:05

this back over let's take a look a

play05:07

little bit closer at the go back to that

play05:09

Windows 10 machine here and look at

play05:10

partition three and I can see users

play05:13

there's the one user admin now this is

play05:16

just gonna show me the content to the

play05:21

administer

play05:22

I'll the files under the admitting that

play05:26

fits in not just in this folder but in

play05:28

all of these folders you and instead of

play05:31

selecting selected folders only you

play05:33

could easily flip over to all subfolders

play05:36

this basically gives you a recursive

play05:38

view of all of the files within that so

play05:41

to run a full search on everything and

play05:43

you could do that for the entire drive

play05:44

as well there goes and it's you can

play05:48

actually go through and do any sort of

play05:50

sorting or filtering if you wanted to

play05:52

sort on the created time or anything

play05:54

like that and this gonna this can help

play05:58

if you if you're looking for doing some

play06:00

time lining activity in the file system

play06:02

um but in a larger scale beyond just

play06:05

what the contents of a single file or

play06:07

folder additionally if I go back to and

play06:10

I'll go just to select its folders only

play06:12

and go back to users here I've got the

play06:15

user admin right here but pretend

play06:17

there's three or four users to this this

play06:20

computer and I want to see all the

play06:21

artifacts related to just the admitted

play06:26

in folder here and I can do this for any

play06:28

file or folder in the file system and I

play06:31

can click view related artifacts so I

play06:33

can do that

play06:34

it automatically flips me to the

play06:36

artifacts page and we'll run a filter to

play06:38

just show me the admin's artifacts so

play06:41

instead of looking at six hundred

play06:43

thousand or so artifacts for the entire

play06:46

case there's only forty three thousand

play06:48

that are found under the user's profile

play06:50

this is really helpful especially if you

play06:52

want to look at just the browsing

play06:53

activity or just the chats or anything

play06:55

related to just that that's single user

play06:58

again you could very easily do this for

play07:01

any file or folder maybe you just want

play07:03

to see anything that came from

play07:04

unallocated space same sort of concept

play07:06

applies let me clear that filter out and

play07:09

let me flip over to the registry view so

play07:12

we also have a dedicated registry view

play07:13

you might have seen some of the registry

play07:14

hives in the file system but you can

play07:16

actually look at those in a dedicated

play07:18

registry view as well and you can see

play07:19

there's the file system and there's the

play07:21

registry but let's actually use that

play07:22

same source linking we used to get to

play07:24

the file system view and we'll do that

play07:26

to the registry so let's go to operating

play07:28

system artifacts you can see there's a

play07:29

whole lot here let's find one that goes

play07:31

to the registry there's user assist so I

play07:34

can see there's a whole lot of user

play07:36

assist activity here and there's a

play07:38

reference to our RAM capture tool so

play07:40

somebody used on a USB the RAM capture

play07:43

tool to acquire memory and it came up in

play07:46

the the user assist here so we can see

play07:49

that there's the basic details it was

play07:50

run once there's the date and time is

play07:52

March 16th and you can see this came

play07:54

from the users enter user Def perfect if

play07:57

I clicked on the source it would take me

play07:58

to the file system right to the unti

play08:00

user at the location however is the key

play08:03

within the hive so if I click on this it

play08:06

will take me to the registry view and it

play08:08

will automatically take me right down to

play08:10

where all that beautiful user sis data

play08:13

is now Microsoft loves to store that in

play08:15

rot13

play08:16

so it's really ugly but we've done the

play08:19

translation for you on the artifact side

play08:20

but you can see very easily that's how

play08:23

it gets get stored in there and you can

play08:25

you can take a look at any of the

play08:27

details as you want to go through like I

play08:30

said you do get to see all of the the

play08:32

registry hives here there's the Windows

play08:33

10 PC there is all the hives there's the

play08:35

users hives for the NT user dot and

play08:38

whatever else but you can very easily

play08:41

follow through that the nice thing about

play08:44

linking back and forth is that in case

play08:46

you

play08:46

remember exactly where things are in the

play08:48

registry or you don't like traversing

play08:50

through that entire hierarchy the

play08:52

one-click really gets you there a lot

play08:54

faster and again you can still do that a

play08:55

source linking from the the evidence

play08:58

sources so if I click here this will

play09:00

take me to the file system right to that

play09:02

users NT user dot dot and again I could

play09:05

easily right-click save the file out and

play09:07

then I could do some additional analysis

play09:10

outside of axiom so you have some

play09:11

dedicated registry tools you want to use

play09:14

you can easily export that out and do

play09:17

some additional analysis there that's

play09:19

everything I wanted to show for for this

play09:21

video

play09:22

thanks for watching

Rate This

5.0 / 5 (0 votes)

相关标签
Digital ForensicsMagnet AxiomFile SystemRegistry AnalysisArtifactsHex ViewerSQLite ViewerMobile ForensicsiOS AnalysisData Decoding
您是否需要英文摘要?