Professional Documents
Culture Documents
CHFI v3 Module 07 Understanding File Systems and Hard Disks
CHFI v3 Module 07 Understanding File Systems and Hard Disks
C t HHacking
ki
Forensic Investigator
Module VII
Understanding File Systems
and Hard Disks
Module Objective
P
Popular
l Linux
Li file
fil systems
t E
Examining
i i FAT di
disks
k Wi d
Windows boot
b t process
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Disk Drive Overview - I
• Compact Disks.
• ZIP Disks.
• r/m Drives.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Disk Drive Overview - II
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Hard Disk (cont’d)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Types of Hard Disk Interfaces
~ SCSI:
• Small
S ll Computer
C System
S IInterface.
f
~ IDE/EIDE:
• Integrated
g Drive Electronics// Enhanced IDE.
~ USB:
• Universal Serial Bus.
~ ATA
ATA:
• Advanced Technology Attachment.
– Serial ATA
– Parallel ATA
~ Fibre Channel:
• Fibre Channel electrical interface.
• Fibre Channel optical interface.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Types of Hard Disk Interfaces: SCSI
~ SCSI is a hardware
interface that allows for
th connection
the ti off up tto
15 peripheral devices to
a single PCI board
called a "SCSI host
adapter" that plugs into
th motherboard.
the th b d
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Types of Hard Disk Interfaces: IDE/EIDE
~ With IDE,
IDE the controller electronics
and slave.
slave
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Types of Hard Disk Interfaces: USB
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Types of Hard Disk Interfaces: ATA
• A balanced 150W
5 line.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Disk Platter
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Disk Platter (cont’d)
Side 0 Side 1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Tracks Numbering
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Sector
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Sector
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Sector Addressing
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Cluster
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Cluster Size
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Slack Space
Hello World - - - - - - - - - - - - - - - - - - - - - - - - - - - -
~ Slack space is the free space on the cluster after writing data on that cluster.
~ DOS
OS and
a d Windows
do s utilize
ut e fixed
ed size
s e clusters
c uste s for
o filee syste
system.
~ If the size of stored data is less than the cluster size, the unused area remains
reserved for the file resulting in slack space.
~ DOS and FAT 16(file allocation table) file system in the Windows utilizes very
large sized clusters.
~ For example, if the partition size is 4 GB, each cluster will be 32 K. Even if a file
needs onlyy 10 K,, the entire 32
3 K will be allocated,, resulting
g in 22 K of slack
space.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Slack Space
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Lost Clusters
Bad Sector
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Disk Capacity Calculation
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Disk Capacity Calculation (cont’d)
1 Kilobyte (KB) =
2 10 bytes = 1,024 bytes
1 Megabyte (MB) =
2 20 bytes = 1,048,576 bytes = 1,024 KB
1 Gigabyte (GB) =
2 30 bytes = 1,073,741,824 bytes = 1,048,576 KB = 1,024 MB
1 Terabyte
y ((TB)) =
2 40 bytes = 1,099,511,627,776 bytes = 1,073,741,824 KB = 1,048,576 MB =
1,024 GB
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Evidor: The Evidence Collector
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Evidor: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
WinHex
~ Computer Forensics & Data Recovery Software, Hex Editor & Disk
Editor.
Edi
~ Features:
• Di
Disk
k editor
dit ffor h
hard
d di
disks,
k flfloppy disks,
di k CD-ROM
CD ROM & DVD
DVD, ZIP
ZIP,
Smart Media, Compact Flash.
• Native
Nat ve support
suppo t for
o FAT,, NTFS,
N S, Ext2/3,
t /3, ReiserFS,
e se S, Reiser4,
e se 4, U
UFS,
S,
CDFS, UDF.
• Built-in interpretation of RAID systems and dynamic disks.
• RAM editor, providing access to physical RAM and other
processes' virtual memory.
• Data interpreter, knowing
k 20 data
d types.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
WinHex: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
WinHex: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
WinHex: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
WinHex: Screenshot
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Understanding File Systems
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Types of File System
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
List of Disk File Systems
~ADFS – Acorn filing system, successor to DFS
~BFS – the Be File System used on BeOS
~EFS – Encrypted file system, An extension of NTFS
~EFS (IRIX) – an older block filing system under IRIX
~Ext – Extended file system, designed for Linux systems
~Ext2 – Extended file system 2, designed for Linux systems
~Ext3 – Extended file system 3, designed for Linux systems, (ext2+journalling)
~FAT – used on DOS and Microsoft Windows, 12 and 16 bit table depths
~FAT32 – FAT with 32 bit table depth
~FFS (
(Amiga)
g ) – Fast File System,
y , used on Amiga
g systems.
y Nice for floppies,
pp , but fairlyy useless
on hard drives
~FFS – Fast File System, used on *BSD systems
~Files-11 – OpenVMS
p file system
y
~HFS – Hierarchical File System, used on older Mac OS systems
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
List of Disk File Systems (cont’d)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
List of Disk File Systems (cont’d)
~ PFS – and PFS2, PFS3, etc. Technically interesting file system available for the Amiga,
performs very well under a lot of circumstances
~ ReiserFS – File system which uses journaling
~ Reiser4 – File system which uses journaling, newest version of ReiserFS
~ SFS – Smart File System,
System available for the Amiga
~ Sprite – The original log-structured file system
~ UDF – Packet-based file system for WORM/RW media such as CD-RW and DVD
~ UFS – Unix File system, used on older BSD systems
~ UFS2 – Unix File system, used on newer BSD systems
~ UMSDOS – FAT file system extended to store permissions and metadata, used for Linux
~ VxFS – Veritas file system, first commercial journaling file system; HP-UX, Solaris, Linux,
AIX
~ XFS – Used on SGI IRIX and Linux systems
~ ZFS – Used on Solaris 10
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
List of Network File Systems
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
List of Special Purpose File Systems
~ acme (Plan 9) (text windows)
~ archfs (archive)
~ cdfs (reading and writing of CDs)
~ cfs (caching)
~ Davfs2 (WebDAV)
( )
~ DEVFS
~ ftpfs (ftp access)
~ lnfs (longg names)
~ LUFS ( replace ftpfs, ftp ssh ... access)
~ nntpfs (netnews)
~ plumber (Plan 9) (interprocess communication – pipes)
~ PROCFS
~ ROMFS
~ TMPFS
~ wikifs (wiki wiki)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Popular Linux File Systems
~ EXT (Extended File System)
• First file system for the Linux operating system to overcome certain limitations of
the Minix file system.
• Quickly replaced by the second extended file system.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Sun Solaris 10 File System: ZFS
~ ZFS is a filesystem first used in Sun Microsystems Solaris 10
• Uses 128
128-bit
bit addressing to perform read/write operation referred to as a "giga-
giga
terabyte" (a zettabyte).
• Any modification to this filesystem will never increase its storage capacity.
~ Main Features:
• Facilitates immediate backup as the file is written.
• Introduced Logical Volume Management(LVM) features into the file system.
• File systems are portable between little-endian and big-endian systems.
• Provides data integrity to detect and correct errors.
• g feature p
HA Storage+ provides cluster/failover
/ compatibility
p y in case of anyy
interruption(only one server is empowered to perform write operation on the disk).
• Creates many copies of the single snapshot with minimum overheads.
• Deletes all the unused memoryy space
p out of files.
• Supports full range of NFSv4/Windows NT-style ACLs.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Mac OS X File System
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Windows File systems
~ FAT (File Allocation Table)
• 16-bit file system developed for MS-DOS.
MS-DOS
• Used in all the consumer versions of Microsoft Windows.
• Considered relatively uncomplicated and became popular format for devices such
ppy disks,, USB devices,, Digital
as floppy g cameras,, flash disks.
~ FAT32
• 32-bit version of FAT file system with storage capacity up to 2 GB.
~ NTFS ((New Technology
gy File System)
y )
• NTFS has three versions
– v1.2 (v4.0) found in NT 3.51 and NT 4.
– v3.0 (v5.0 ) found in Windows 2000.
– v3.1 (v5.1) found in Windows XP and Windows Server 2003.
• Newer versions added extra features like quotas introduced by Windows 2000. In
NTFS, anything such as file name, creation date, access permissions and even
contents is written down as metadata.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
CD-ROM / DVD File system
~ The ISO 9660 (International Organization for Standardization)
defines a file system for CD-ROM and DVD-ROM media.
~ To exchange data it supports various computer operating
systems such as Microsoft Windows, Mac OS, and UNIX-based
systems.
~ There are some extensions to ISO 9660 to cope up its demerits.
demerits
• Longer ASCII coded names and UNIX permissions are
facilitated by Rock Ridge.
• Unicode namingg ((like non roman scripts)are
p ) also
supported by Joliet.
• Bootable CDs are facilitated by El Torito.
~ ISO 13490 is combination of ISO 9660 with multisession
support.
~ Windows supports two types of file systems on CD-ROM and
Digital Versatile Disk (DVD):
• Compact Disc File System (CDFS).
(CDFS)
• Universal Disk Format (UDF).
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Comparison of File System
Copyright © by EC-Council
EC-Council Source: http://encyclopedia.laborlawtalk.com/Comparison_of_file_systems
All Rights Reserved. Reproduction is Strictly Prohibited
Disk Partition
~ Hard disk drive partitioning is the creation of logical divisions upon a hard
disk that allows one to apply operating system-specific logical formatting.
~ Primary
~ Extended
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Master Boot Record
~ A master boot record (MBR) is the first
sector ("sector zero") of a data storage device
such
h as a hard
h d disk.
di k
~ The information regarding the files on the
disk, their location, size and other important
data is stored in the Master Boot Record file.
~ In practice, MBR almost always refers to the
512-byte boot sector, or partition sector of
a disk.
Backing
ki up the
h MBR
In UNIX/Linux dd can be used to backup and
restore the MBR.
to backup
dd if=/dev/xxx of=mbr.backup bs=512
count=1
to restore
dd if=mbr.backup of=/dev/xxx bs=512
count=1
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Examining FAT
~ When a file is deleted from the operating system it replaces the first word of the
file name by a lower case Greek letter
letter. The space is made available for new files
files.
~ These files can be recovered using forensic tools.
~ Few tools which can be used for forensics are:
• WINHEX
• UNDELETE
• FILE SCAVENGER
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Boot Sector
~A boot sector is the first
sector (512 bytes) of a FAT
file system.
~ Unix-like terminology
p
defines it as superblock.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NTFS
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NTFS Master File Table (MFT)
~ Each file on an NTFS volume is represented by a record in a special file called the master
file table (MFT).
~ NTFS reserves the first 16 records of the table for special information.
~ The first record of this table describes the master file table itself,
itself followed by an MFT
mirror record.
~ If the first MFT record is corrupted, NTFS reads the second record to find the MFT
mirror file, whose first record is identical to the first record of the MFT.
~ The locations of the data segments for both the MFT and MFT mirror file are recorded in
the boot sector. A duplicate of the boot sector is located at the logical center of the disk.
~ The third record of the MFT is the log file, used for file recovery. The seventeenth and
following records of the master file table are for each file and directory (also viewed as a
fil b
file by NTFS) on the
h volume.
l
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NTFS Master File Table (MFT)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Metadata File Table (MFT)
File or
Standard Data or Unused
Directory
Information index p
space
Name
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NTFS Attributes-I
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NTFS Attributes-II
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NTFS Data Stream-I
~ NTFS supports multiple data streams, where the stream name identifies a new
data attribute on the file.
file
~ A handle can be opened to each data stream.
~ A data stream, then, is a unique set of file attributes.
~ The
h ffollowing
ll i iis an example
l off an alternate
l stream:
~ C:\ECHO text_message > myfile.txt :stream1
~ When you copy an NTFS file to a FAT volume, such as a floppy disk, data
streams and other attributes not supported by FAT are lost.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NTFS Data Stream-II
2
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NTFS Data Stream-III
4
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NTFS Compressed Files
~ The compressed files present on the NTFS volume can be accessed, read
or modified
difi d b
by any Wi
Windows
d application
li i without
ih d
decompressing
i theh
file.
~ When an application like Microsoft word or operating system
commands like copy command requests to access, file is decompressed
by the filter driver.
~ NTFS compression algorithms support cluster sizes up to 4 KB.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
NTFS Encrypted File Systems (EFS)
~ Encrypting File System (EFS) provides the core file encryption technology used
to store encrypted files on NTFS file system volumes.
volumes
~ Once you encrypt a file or folder, you work with the encrypted file or folder just
as you do with any other files and folders.
~ Encryption is transparent to the user who encrypted the file.
file
~ This means that you do not have to manually decrypt the encrypted file before
you can use it.
~ You can open and change the file as you normally do.
do
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
EFS File Structure
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
EFS Recovery Key Agent-I
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
EFS Recovery Key Agent -II
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
EFS Key
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Deleting NTFS Files
~ Upon deletion from Windows Explorer, the file is moved into the
recycle bin.
bin
~ If the file is deleted from command prompt then recycle bin is
bypassed. You can recover it by using forensic tools.
~ When a file is deleted, the operating system performs the following
tasks in the NTFS:
• The
Th clusters
l are made
d available
il bl for
f the
h new d
data.
• MFT attribute $BITMAP is updated.
• File attribute of the MFT is marked available.
available
• Any linking inodes and VFN/LCN cluster locations are removed
from MFT.
• The list of links to the cluster locations is deleted.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Registry Data-I
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Registry Data-II
The Hives
Key Key
S bK
Sub-Key Sub-Key
Value Value
K
Key K
Key
Sub-Key Sub-Key
Value Value
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Registry Data-III
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Examining Registry Data
• Registry Monitor
• Registry Checker
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
FAT vs. NTFS
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Windows XP System Files
~ Essential system files used by Windows XP:
File name Description
Ntoskrnl.exe The executable and kernel of Windows XP
Ntkrnlpa.exe Physical address support program (for>4GB)
Hal.dll Used for OS kernel to communicate with
computer’s hardware
Win32k.sys Kernel mode for Win32 subsystem
Ntdll.dll Supports internal functions and dispatches the
stubs to executive functions
Kernel32.dll
Advapi32.dll Win32 subsystem DLL files
User32 dll
User32.dll
Gdi32.dll
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Windows Boot Process (XP/2003)
~ Step 1
• Power supply switched on.
~ Step 2
• The microprocessor timer chip receives the Power Good signal.
~ Step 3
• The CPU starts executing the ROM BIOS code.
~ Step 4
• The ROM BIOS performs a basic test of central hardware to verify basic functionality.
~ Step 5
• The BIOS searches for adapters that may need to load their own ROM BIOS routines.
~ Step 6
• The ROM BIOS checks to see if this is a 'cold-start' or a 'warm-start‘.
~ Step 7
• If this is a cold-start the ROM BIOS executes a full POST (Power On Self Test). If this is a
warm-start
a m sta t the memory
memo test po portion
tion of the POST is switched
s itched off
off.
~ Step 8
• The BIOS locates and reads the configuration information stored in CMOS.
~ Step 9
• If the
th first
fi t bbootable
t bl di
disk
k iis a fi
fixed
d di
disk
k th
the BIOS examines
i th
the very fi
firstt sector
t off th
the di
disk
k ffor
a Master Boot Record (MBR). For a floppy the BIOS looks for a Boot Record in the very first
sector.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Windows Boot Process (XP/2003)
(cont d)
(cont’d)
~ Step 10
• With a valid MBR loaded into memoryy the BIOS transfers control of the b
boot p
process to the
partition loader code that takes up most of the 512 bytes of the MBR.
~ Step 11
• The partition loader (or Boot Loader) examines the partition table for a partition marked as
active. The partition loader then searches the very first sector of that partition for a Boot
Record.
~ Step 12
• The active partition's boot record is checked for a valid boot signature and if found the boot
sector code is executed as a program.
program
~ Step 13
• During the initial phase NTLDR switches the processor from real-mode to protected mode
which places the processor in 32-bit memory mode and turns memory paging on. It then
loads the appropriate mini-file
mini file system drivers to allow NTLDR to load files from a partition
formatted with any of the files systems supported by XP.
~ Step 14
• If the file BOOT.INI is located in the root directory NTLDR will read it's contents into
memory. If BOOT.INI
BOOT INI contains
t i entries
t i for
f more th than one operating
ti system
t NTLDR will ill stop
t
the boot sequence at this point, display a menu of choices, and wait for a specified period of
time for the user to make a selection.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Windows Boot Process (XP/2003)
(cont d)
(cont’d)
~ Step 15
• Assuming that the operating system being loaded is Windows NT, NT 2000,
2000 or XP pressing F8 at
this stage of the boot sequence to display various boot options including "Safe Mode" and "Last
Known Good Configuration“.
~ Step 16
• If the selected operating system is XP, NTLDR will continue the boot process by locating and
loading the DOS based NTDETECT.COM program to perform hardware detection.
~ Step 17
• If this computer has more than one defined Hardware Profile the NTLDR program will stop at
this point and display the Hardware Profiles/Configuration Recovery menu.
~ Step 18
• After
f selecting
l i ah hardware
d configuration
fi i (if necessary)) NTLDR b
begins
i lloading
di the
h XP k
kernell
(NTOSKRNL.EXE).
~ Step 19
• NTLDR now loads device drivers that are marked as boot devices
devices. With the loading of these
drivers NTLDR relinquishes control of the computer.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Windows Boot Process (XP/2003)
(cont d)
(cont’d)
~ Step 20
• NTOSKRNL goes through two phases in its boot process - phase 0 and phase 1. Phase 0
initializes
l just enough
h off the
h microkernel
k l and
d Executive subsystems
b so that
h b basic services
required for the completion of initialization become available. At this point, the system
display a graphical screen with a status bar indicating load status.
~ Step 21
• The initialization of I/O Manager begins the process of loading all the systems driver files.
Picking up where NTLDR left off, it first finishes the loading of boot devices. Next it
assembles a prioritized list of drivers and attempts to load each in turn.
~ Step 22
• The last task for phase 1 initialization of the kernel is to launch the Session Manager
Subsystem (SMSS). SMSS is responsible for creating the user-mode environment that
provides the visible interface to NT.
~ Step 23
• SMSS loads the win32k.sys device driver which implements the Win32 graphics subsystem.
~ Step 24
• The XP boot process is not considered complete until a user has successfully logged onto the
system. The process is begun by the WINLOGON.EXE file which is loaded as a service by the
kernel and continued by the Local Security Authority (LSASS.EXE) which displays the logon
dialog box.
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
http://www.bootdisk.com
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Summary