Mining Data from the Windows Registry

Mining Data from the Windows Registry

via YouTube Direct link

Anti-Anti Forensics

22 of 25

22 of 25

Anti-Anti Forensics

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Mining Data from the Windows Registry

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 The Windows Registry
  3. 3 Registry Terminology
  4. 4 Primary Hives Comprising the Registry
  5. 5 Progression of the Registry
  6. 6 Extracting from Offline Hives
  7. 7 Extracting from Live System
  8. 8 Interesting Data Stored in the Registry
  9. 9 What programs have been executed?
  10. 10 Executed Programs: UserAssist
  11. 11 Parsing User Assist
  12. 12 Executed Programs: MuiCache
  13. 13 Executed Programs: AppCompatCache
  14. 14 What Files Have Been Accessed?
  15. 15 Accessed Files: RecentDocs
  16. 16 Accessed Files: ComDlg32
  17. 17 Accessed Files: Office 2013
  18. 18 Shellbags
  19. 19 Anti-Forensics/Cleaning Tools
  20. 20 Privazer Shellbag Cleaner
  21. 21 Effects of CCleaner/Privazer
  22. 22 Anti-Anti Forensics
  23. 23 Timestomping Registry Keys
  24. 24 Combating timestomped registry keys
  25. 25 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.