Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Stop writing tests: Automate fully with Generative AI

      August 19, 2025

      Opsera’s Codeglide.ai lets developers easily turn legacy APIs into MCP servers

      August 19, 2025

      Black Duck Security GitHub App, NuGet MCP Server preview, and more – Daily News Digest

      August 19, 2025

      10 Ways Node.js Development Boosts AI & Real-Time Data (2025-2026 Edition)

      August 18, 2025

      This new Coros watch has 3 weeks of battery life and tracks way more – even fly fishing

      August 20, 2025

      5 ways automation can speed up your daily workflow – and implementation is easy

      August 20, 2025

      This new C-suite role is more important than ever in the AI era – here’s why

      August 20, 2025

      iPhone users may finally be able to send encrypted texts to Android friends with iOS 26

      August 20, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Creating Dynamic Real-Time Features with Laravel Broadcasting

      August 20, 2025
      Recent

      Creating Dynamic Real-Time Features with Laravel Broadcasting

      August 20, 2025

      Understanding Tailwind CSS Safelist: Keep Your Dynamic Classes Safe!

      August 19, 2025

      Sitecore’s Content SDK: Everything You Need to Know

      August 19, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Why GNOME Replaced Eye of GNOME with Loupe as the Default Image Viewer

      August 19, 2025
      Recent

      Why GNOME Replaced Eye of GNOME with Loupe as the Default Image Viewer

      August 19, 2025

      Microsoft admits it broke “Reset this PC” in Windows 11 23H2 KB5063875, Windows 10 KB5063709

      August 19, 2025

      Windows 11 can now screen record specific app windows using Win + Shift + R (Snipping Tool)

      August 19, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Operating Systems»RegRipper

    RegRipper

    July 3, 2025

    The awesome folks over at Cyber Triage recently published their 2025 Guide to Registry Forensic Tools, and being somewhat interested in the Windows Registry, I was very interested to take a look. The article is very well-written, and provides an excellent basis for folks who are new to DF/IR work, and new to the Windows Registry.

    Within the blog post, there’s a table in the Registry Forensic Tools section (see the image to the right). In the image, we see that one of the metrics or indicators associated with the tools listed are whether or not the tool “handles transaction logs”, with just a statement to that effect. 

    If someone is new to including the Windows Registry as part of their analysis process, and doesn’t understand the purpose of the transaction logs, nor how they work, they’d likely look at this table and think, “Well, I’m not using RegRipper! Handling the transaction logs are important to Chris Ray, and while I don’t know why, I’m going to go along with what Chris recommends!”
    The statement, “Does not handle transaction logs” doesn’t tell the whole story, as I purposely wrote RegRipper to not handle the transaction logs. From my perspective, incorporating transaction logs into your analysis needs to be a purposeful, intentional decision. Incorporating transaction logs certainly has it’s place in any analysis process for Windows systems, but it should not happen automagically, without the analyst/examiners knowledge. And it should not  just happen every time. Further, why should I write out code for processing transaction logs, when as it is, there are a number of other tools that already allow you to do so? Why re-write this capability? 
    You know, this kind of thing has happened before. In 2012, at a pretty big DF/IR security conference, a Google engineer was presenting on an enterprise-wide response capability, and included a slide that said, “RegRipper does not scale to the enterprise.” I was in the front row, because…you know…DF/IR, and was a little taken aback by this statement. This was like stating that the F-150 truck, the most popular model of light pickup, does not transition to airplane mode. No, because it was never intended to, and it wasn’t designed that way. So, rather than reaching out and engaging the author of the tool, and asking, “hey, what do you think about making this an enterprise tool?”, the presenter simply made their statement, and left it at that.

    Now, why did I want handling the transaction logs to be a purposeful, intentional decision? If you’ve ever processed the transaction logs, you’ll notice that when you apply the transaction logs to a Registry hive, the hive file itself remains the same size; keys and values are updated or added, but the file itself remains the same size, even through the hash changes. This means that for the resulting hive file, unallocated space within the hive file is overwritten…deleted keys and values, and possibly even slack space, are overwritten.

    Why does this matter? Well, consider the recent write-up on the DEVMAN ransomware variant (from ANY.RUN). The image to the left discusses file lock evasion (the inclusion of “persistence” in the heading is a bit misleading), and states, “Each of these entries is quickly deleted after being written…”, which means these entries become part of unallocated space. Now, this may not be important to you, based on your investigative goals…or it may be very important.

    So, to be clear, if you’re at all interested in data deleted from the Registry, and you understand that Registry hive files themselves contain unallocated space, and that values can contain slack space, you might not want to just automatically apply transaction logs. Depending upon the timing of the incident and your investigative goals, you may want to first fully parse the hive file, before applying the transaction logs and applying the same parsing process a second time. Sort of a “before” and “after” snapshot of the hive.

    Neither RegRipper v3.0 nor RegRipper v4.0 processes the transaction logs; however, both are open source, and you can write your own plugins, or modify current plugins in any way you choose, such as changing the output format. For example, both versions include multiple plugins that output in 5-field TLN format (for inclusion directly into a timeline events file), and v4.0 has several plugins that output in JSON format. I get it, though…the TLN output is meaningless if you’re not creating timelines.

    Also, with RegRipper v4.0, I got Yara working within RegRipper, meaning that you can run Yara rules against Registry values, right from RegRipper.

    Finally, both versions include plugins to do various parsing, such as parsing unallocated space, parsing Registry value sizes, locating EXE/PE files in Registry values, etc.

    Source: Read More 

    windows
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMicrosoft begins removing PowerShell 2.0 as it cleans up Windows 11
    Next Article Marvel Rivals Season 3 Launches July 11 with Perks for College Players

    Related Posts

    Learning Resources

    Why GNOME Replaced Eye of GNOME with Loupe as the Default Image Viewer

    August 19, 2025
    Operating Systems

    Microsoft admits it broke “Reset this PC” in Windows 11 23H2 KB5063875, Windows 10 KB5063709

    August 19, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Alibaba Qwen Team Just Released Qwen3: The Latest Generation of Large Language Models in Qwen Series, Offering a Comprehensive Suite of Dense and Mixture-of-Experts (MoE) Models

    Machine Learning

    CVE-2025-31238 – Apple Safari Web Content Memory Corruption Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Google’s coding agent Jules gets critique functionality

    Tech & Work

    After years with Windows, I used the MacBook Air M4 for one week. Here’s how it went

    News & Updates

    Highlights

    How to Spot High-Quality Designs

    April 8, 2025

    Stock templates are a lifesaver for designers, marketers, and small business owners. Whether you’re building…

    FydeOS is a ChromiumOS Linux based distribution

    April 18, 2025

    The AI Hype Train Has No Brakes

    May 21, 2025

    CVE-2025-49792 – Apache HTTP Server Cross-Site Request Forgery

    June 11, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.