• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

20 Forensic Investigation Tools for Windows

by wing

To investigate Windows system security breach for any potential security breach, investigators need to collect forensic evidence. Microsoft has developed a number of free tools that any security investigator can use for his forensic analysis. This post will give you a list of easy-to-use and free forensic tools, include a few command line utilities and commands.

To collect windows system time use the following command

C:> date /t & time /t

To collect logged in user information download PsLoggedOn from Microsoft

at http://technet.microsoft.com/en-us/sysinternals/bb897545.aspx

this tool shows a list of users who are logged into the system both locally and remotely.

To see which IP and users have accessed your system from which OS platform, use netession command, which is a built in window

Net session

To see active logon session in your system use the Logonsessions.exe built by Microsoft. You can download at http://technet.microsoft.com/en-us/sysinternals/bb896769.aspx

To see which files are being access by the users, use psfile.exe tool, which is free to download from http://technet.microsoft.com/en-us/sysinternals/bb896649.aspx. You can also use “net file” command to see a list of files opened by remote connection. openfiles.exe is another useful tool that shows a listed of opened files.

NetBIOS caching information

When an attacker gain access to a system they want to see the other computers in the network. You can see what other machines are accessible from your system by using nbtstat command. When your computer make a connection to other computer you can see a list  NetBIOS cache in your system. If you see anything, it means probably the attacker has compromised those system as well.

Network connection status

When you run a Windows forensic investigation to a system, you need to see network connection to and from the compromised computer. remember that this network connection expires over time. Therefore, you need to collect this information as soon as you suspect that the system has been compromised. To record and log network connection information, you can check firewall logs and can download “Port Reporter” from Microsoft- http://www.microsoft.com/en-us/download/details.aspx?id=9964. Unfortunately, port reported only works with Windows 2000,2003 and  XP.

Remember that without network connection based information, it is almost impossible to tell whether somebody has copied  sensitive data from your computer.

Another handy tool to see live network connection is netstat, which is a built-in windows tool. This tools show both TCP and UDP connection including the state(listening, established, time_wait etc.). Also you can see a list of process ID using the TCP and UDP ports. To see live network activity with netstat utility type the following commands in your command prompt:

Netstat –ano

To see routing tables use the following switch:

Netstat -r

Windows process information

Though windows task manager shows a list of running process, it never show all the running process. All the well-known system process has it default path. Malicious program may install itself in the same name as legitimate process, but it will not be installed in the default Windows path already used by the system. You can download an advanced process monitoring tool called “process monitor “from Microsoft. http://technet.microsoft.com/en-us/sysinternals/bb896645.aspx. This tool shows live activities for registry, files, process, threads and events.

Tasklist.exe

This is a built-in tool to check all the available image name, PID session name, memory usage and session ID. To get detailed  information about processes, you can use /v and /svc switch. You have to type the following commands in your command prompt.

Tasklist /v

Tasklist /svc

Pstools

This is a collection of useful process related tools. You can download it from http://technet.microsoft.com/en-us/sysinternals/bb896682.aspx. After downloading, unzip it in any location. Say, you have unzipped in your C drive. To run the commands, open your command prompt and then type the location of the Pstools folder. Next type the name of the exe file located in the PSToosl folder.

C:\PSTools> pslist

ListDll

This tool show a list of modules or dll a process is using. When a program runs it needs certain types of dll to run certain types of functions. In brief, the dlls makes programming easy by giving the programming options to call some common function from the system, avoiding the hassle of rewriting codes for functions frequently used by the programs. To run this utility, go the the location from your command prompt, where you unzipped the files. Next, type “listdlls –u” to see the lists of all unsigned dlls.

Download it at: http://technet.microsoft.com/en-us/sysinternals/bb896656.aspx)

Handle

This tools shows a  list of resources a process uses while it is running. You can download it at http://technet.microsoft.com/en-us/sysinternals/bb896655.aspx

Windows file protection(WFP)

Windows file protection prevent critical files being modified or deleted accidentally. If there is any attempt to modify your system files or have been modified, then WFP automatically replace that file with a good one. As a result of this action, an event with event id: 64001 will be generate in the event view. If

you discover such events in the event viewers you can assume that there was an attempt by a program to modify your system file, which does not necessarily mean that your system has been compromised.

Process to port mapping tools

To start communication with the external world, your system open network connection. When a network connection start, a process control that connection and communicate via a port. Therefore, every network connection is associated with a process and a port. You can use the popular netstat command to check which process has opened connection. The command:

Netstat –o

Apart command line tools, you can see more detailed listing of ports with TCPview to see the local address, remote address, local ports, remote ports and PID.  Download it at http://support.microsoft.com/kb/892853

NIC promiscuous mode detection

Your network card can captures traffic and send sensitive information to attacker if your network card is in promiscuous mode. It is hard to know if your NIC unless you use any automated tool.  One such useful tool is Promqry by Microsoft, which is available in both command-line-tool format  and user interface format. You can download it from http://support.microsoft.com/kb/892853

If your NIC is in non-promiscuous mode, you can safely say that no one has installed any sniffing software on your computer to collect your confidential information.

Clipboard content

Clipboard is a special region in RAM where program like Microsoft word store information for editing purpose. Data obtained from the clipboard can give useful clues to forensic investigators. To view clipboard contents you can download Pclip.exe on the computer that you are investigating for discovering attack signature.

Process memory collection

To collect process memory contents use Userdump.exe

Windows memory analysis

Contents of the RAM can provide investigators useful information-such as password or malware- that may not be found in the hard drive. If you want to collect information about the memory used by a process, you have the options of using a number of tools such as Process Dumper(pd.exe), userdump.exe, adplus.vbs etc.

Rather than dumping the process memory you can dump the entire contents of the RAM. Some useful physical memory dumping tools you can use are Nigilant32, ProDiscover, KnTDD, MDD, Win32dd, Memoryze, Winen, Fastdump, F-Response

Registry analysis tool

Though registry files may be appear to be intimidating to the new investigators, they can reveal valuable information to about a compromised system. The two useful registry analysis tools that you can try out are ProDiscover and RegRipper.

Windows File logs

Windows event view provides every  important events and warning generated by the system. Fortunatley, there is a great tool called log parser that can help you analyze events. You can download GUI version of this tool from www.codeplex.com/visuallogparser.

Suspicious .exe file analysis.

During an forensic investigator process, you might come across .exe files that may look suspicious to you and you want to uncover the function of that file.  one of the easiest way to check a .exe file is to scan it with a antivirus software. Although,  many antivirus fail to recognize the malicious intent of codes, sometimes it can give you the clue whether the file safe or not. The next step in analyzing executable files is runt the file through strings.exe, which can give information about the nature or purpose of the file. another useful string searching tool is BinText.

Rootkit

A rootkit is simply a program that can hide itself by modifying the operating system’s capability to audit or to log suspicious events. Therefore, you will no nothing about suspicious activities by looking at the logs if your system has a rootkit installed. Fortunately, Microsoft has developed its own rootkit detection tools Rootkit Revealer that you can download at http://technet.microsoft.com/en-us/sysinternals/bb897445.aspx

Though rootkit revealer can detect registry and file level rootkits, it fails to detect kernel level rootkits. Some other useful rootkit detection tools are MS Strider GhostBuster,F-secure backlight,  Sophos Anti-Rootkit, Helios, GMER.

The purpose of this post was to introduce you with various  forensic investigation tools for Windows operating system, which can help you to develop skills in forensic investigation. If you want to share your tools with use, please post your feedback and links in the comment section.

Related posts:

  1. Internet Explorer Security Settings Configuration Guide
  2. 11 Essential Skills of an IT Auditor
  3. Database Security Issues and Countermeasures
  4. Top 10 Tips to Start a Career as an IT Auditor

Filed Under: IS Audit Tagged With: forensic, tools, windows

Primary Sidebar

Please help us sharing

Categories

  • AWS
  • Basics
  • Containers
  • Cryptocurrency
  • Cyber
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Law & Human Rights
  • Network Security Tips
  • Off Track
  • Social Media Governance
  • Tech Comparisons
  • Tech Stack Suitability
  • Telecom
  • Tutorial

CISSP Sample Test

Take a CISSP Sample Test

CISA Sample Test

CISA IT governance Sample test

Please Follow Us

Contact us for Ads

Go to Contact Form

Search

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

audit AWS backup basics browser check cisco cloud computer configuration cyber data database email gmail hsrp ids iis informaiton internet kubernetes linux load balancing malware microsoft network protection redundancy risk router security security tips server social media SSL switch test tools vpn vrrp web webserver website windows wordpress

Copyright © 2010-2025 ·All Rights Reserved · SecurityWing.com