<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Windows on Matt Suiche</title><link>https://www.msuiche.com/categories/windows/</link><description>Recent content in Windows on Matt Suiche</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Thu, 29 Jan 2009 12:00:00 +0200</lastBuildDate><atom:link href="https://www.msuiche.com/categories/windows/index.xml" rel="self" type="application/rss+xml"/><item><title>Windows 7 and Windows Server 2008 R2 djoin (Offline Domain Join) utility.</title><link>https://www.msuiche.com/posts/windows-7-and-windows-server-2008-r2-djoin-offline-domain-join-utility./</link><pubDate>Thu, 29 Jan 2009 12:00:00 +0200</pubDate><guid>https://www.msuiche.com/posts/windows-7-and-windows-server-2008-r2-djoin-offline-domain-join-utility./</guid><description>&lt;p&gt;&lt;a href="https://archive.is/o/l7SJM/technet.microsoft.com/en-us/library/dd391977.aspx" target="_blank" rel="noopener"&gt;Offline&lt;/a&gt; &lt;a href="https://archive.is/o/l7SJM/technet.microsoft.com/en-us/library/dd392267.aspx" target="_blank" rel="noopener"&gt;domain&lt;/a&gt; &lt;a href="https://archive.is/o/l7SJM/www.guwiv.com/portal/blogs/news/archive/2009/01/28/astuce-windows-7-connectez-une-machine-224-un-domaine-sans-connexion-r-233-seau.aspx" target="_blank" rel="noopener"&gt;join&lt;/a&gt; is a new process that joins computers running Windows® 7 or Windows Server 2008 R2 to a domain in Active Directory Domain Services (AD DS)—without any network connectivity. This process includes a new command-line tool, Djoin.exe, which you can use to complete an offline domain join.
Run Djoin.exe to provision the computer account metadata. When you run the provisioning command, the computer account metadata is created in a .txt file that you specify as part of the command. After you run the provisioning command, you can either run Djoin.exe again to request the computer account metadata and insert it into the Windows directory of the destination computer.
Following section covers the content of these computer account metadata files.&lt;/p&gt;</description></item><item><title>Retrieving MmPhysicalMemoryBlock regardless of the NT version</title><link>https://www.msuiche.com/posts/retrieving-mmphysicalmemoryblock-regardless-of-the-nt-version/</link><pubDate>Wed, 17 Sep 2008 12:00:00 +0200</pubDate><guid>https://www.msuiche.com/posts/retrieving-mmphysicalmemoryblock-regardless-of-the-nt-version/</guid><description>&lt;p&gt;Here is a method I’m using in the next version of Win32DD (1.2), to retrieve MmPhysicalMemoryBlock regardless of the NT Version. The main problem with &lt;code&gt;KDDEBUGGER_DATA64&lt;/code&gt; structure is the version dependency. Then, we have to rebuild this field by ourselves.
To retrieve physical memory runs, I’m using &lt;code&gt;MmGetPhysicalMemoryRanges()&lt;/code&gt; &lt;em&gt;undocumented&lt;/em&gt; function. This function usage had been documented by Mark Russinovich in 1999, in the &lt;a href="https://archive.is/o/E0vgN/blogs.technet.com/sysinternals/archive/1999/10/20/452896.aspx" target="_blank" rel="noopener"&gt;Volume 1 Number 5 edition of the Sysinternals Newsletter&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Check your system virginity in less than 60 seconds.</title><link>https://www.msuiche.com/posts/check-your-system-virginity-in-less-than-60-seconds./</link><pubDate>Mon, 28 Jul 2008 12:00:00 +0200</pubDate><guid>https://www.msuiche.com/posts/check-your-system-virginity-in-less-than-60-seconds./</guid><description>&lt;p&gt;Today, I wrote a tool called sym32guid which aims at retrieving all stored Program DataBase (*.PDB File) GUID (Globally Unique Identifier) from a physical memory dump. To do why? The first goal was to use use symbols as additional information regarding unexported functions like the über-famous &lt;code&gt;msv1_0!MsvpPasswordValidate&lt;/code&gt;, but it looks it can also be used to detect Virus and Trojan…&lt;/p&gt;
&lt;p&gt;The target machine is a Windows Vista SP1 32bits, I’ve installed last week inside a Virtual Machine and I’ve extracted the physical memory dump from the windows hibernation file through SandMan Framework.&lt;/p&gt;</description></item><item><title>X-Ways Forensics Beta 2 and hibernation file. (coincidence?)</title><link>https://www.msuiche.com/posts/x-ways-forensics-beta-2-and-hibernation-file.-coincidence/</link><pubDate>Thu, 03 Apr 2008 12:00:00 +0200</pubDate><guid>https://www.msuiche.com/posts/x-ways-forensics-beta-2-and-hibernation-file.-coincidence/</guid><description>&lt;p&gt;X-Ways (WinHex editor) Forensics Beta 2 now includes hibernation file(hiberfil.sys) support for Windows XP 32-bit only. Please notice, Sandman library/framework is an open-source project under GNU General Public License v3 to read and write the hibernation file released 2 months ago&amp;hellip;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Posted on Friday, Mar 28, 2008 – 1:05:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Ability to decompress Windows XP 32-bit hiberfil.sys files, whether
active or inactive, to get a dump of physical memory with all in-use
pages from a previous point of time when the computer entered into
hibernation, as well as individually carved xpress chunks from
hiberfil.sys files, including xpress chunks located in the “slack” of
hiberfil.sys that are even older. This feature is available in Edit |
Convert. (forensic license only)
&lt;a href="https://www.x-ways.net/winhex/forum/messages/1/2252.html" target="_blank" rel="noopener"&gt;Source&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;
&lt;p&gt;(PS: I’m not beta-tester)&lt;/p&gt;</description></item></channel></rss>