Sleuth Kit Java Bindings (JNI)  4.12.1
Java bindings for using The Sleuth Kit
OS Accounts and Realms

Overview

This page outlines some of the core concepts around OS accounts and realms and how they are stored. OS accounts are unique data types in the TSK datamodel and have more complexity than other types because we often will not fully understand the details when creating the OS accounts early in the processing and will need to update them at various points as analysis continues.

Basic Terminology

  • An OS account allows a person to do some action or access some resource on a device.
  • A realm is the scope in which the OS account is defined. A realm can be scoped to a single host (i.e., for accounts that exist only on a single host) or to a network domain (such as Windows domain accounts).

OS Account Challenges

A key challenge with OS accounts is that we do not know the account information until we have started to parse files, and the more detailed information will only come from OS configuration files. It is also possible that we may never know the details if we have only a media card.

As a user adds a disk image to the case, we may learn about addresses from the files. But, we won't yet know the account name or if it is domain-scoped or local-scoped. So, the basic properties of the realm and account may change as more data is ingested and analyzed. This could even result in needing to merge realms and accounts.

Another difference from other data types in the TSK data model is that OS accounts may span multiple data sources if they are domain accounts. Therefore, they are not "children" of a data source and exist outside of the usual tree model in TSK.

OS Account Realms

An org.sleuthkit.datamodel.OsAccountRealm represents the scope of a set of OS accounts. A realm's scope is defined by org.sleuthkit.datamodel.OsAccountRealm.RealmScope. By default, the scope is set to host-level and the org.sleuthkit.datamodel.OsAccountRealm.ScopeConfidence is set to inferred. As more is learned, the confidence and scope can be made more specific.

A realm has two core fields:

  • Address that the OS uses internally, such as part of a Windows SID
  • Name that is what users more often see

A local realm also defines the single host that the realm works on.

When searching for realms, the address has priority over the name. Often times with Windows systems, we may have a realm address from SIDs but not a specific realm name.

Realms are managed by org.sleuthkit.datamodel.OsAccountRealmManager.

OS Accounts

An org.sleuthkit.datamodel.OsAccount represents an account that was configured in an operating system. It must be defined within the scope of an OsAccountRealm.

An OS account has two core fields:

  • Login name that the user enters (such as jdoe)
  • Address that the operating system uses internally (such as a UID of 0 or a Windows SID)

OS accounts also have other properties, such as full name, creation date, etc., that can be set after the account is created.

OS accounts are managed by org.sleuthkit.datamodel.OsAccountManager.

OS Account Instances

An OS Account can exist on multiple systems for several reasons, including:

  • It's a domain account and the user logged into several systems
  • It's a local account, but there was a reference to the account in an event log or registry setting.

Therefore, the database stories each instance the account was seen. An account instance shows that there was a reference to the account on a given host. The instance types are defined in org.sleuthkit.datamodel.OsAccountInstance.OsAccountInstanceType.

When writing modules, you should record each instance that you see the account.

Supported Operating Systems

At this point, APIs exist for only Windows accounts, such as:

The underlying database schema supports other operating systems, but the utility APIs do not exist to populate them other than with Windows SIDs. These methods may be added in the future.

Storing Original Account Data in Other Tables

We recommend that the OS account addresses or names that were parsed from the data source be saved alongside any references to OsAccount objects when making new tables. For example, the case database stores the UID or SID that was stored in a file system for a file in addition to the reference to the OsAccount object that is associated with that address. This helps to ensure the original data is preserved in case an Os account can't be created, gets deleted, or is incorrectly merged.

Example Creation & Update Code

There are three unique things to keep in mind when creating or updating OS accounts:

  1. Transactions. To avoid duplicates, OS Accounts are often created and merged outside of a transaction. With single-user cases, you can get into deadlocks when you mix transaction-based API calls and non-transaction API calls.

    This means that if you want to use a CaseDbTransation to add a lot of files or artifacts associated with OS accounts at once, you'll need to:

    1. Pre-process the data to identify what OS accounts you need to create or look up
    2. Look up or create the OS accounts in individual transactions
    3. Start a new transaction and add the files or artifacts with the references to the OS accounts

  2. Updates. When you come accross OS Account data, you may have more info then what already exists in the DB and you should therefore try to upate it. e.g maybe the realm name was unknown. You should call an "update" command just in case you have new data.

  3. Instances. You need to record that an OS account was referenced on a given data source because OS accounts are stored in parallel to data sources and are not children of them. Some methods, such as 'addFile()', will automatically record the instance.

Here are some examples.

Adding a File or Data Artifact

The various addFile() methods allow you to pass in an OsAccount and the database will make the association and record the occurence. All you need to do is get the account. You can do that with org.sleuthkit.datamodel.OsAccountManager.getWindowsOsAccount(). Note that sometimes that call will fail if the SID associated with the file is for a group, for example, if the OS account has admin rights.

If you get an OsAccount, you can try to update it if you think you may have new information.

Here is example pseudo-code:

OsAccount osAcct = null;
try {
Optional<OsAccount> osAcctOpt = getWindowsOsAccount("S-....", "jdoe", "ACME", host);
if (osAcctOpt.isPresent(()) {
osAcct = osAcctOpt.get();
updateWindowsOsAccount(osAccount, "S-.....", "jdoe", "ACME", host);
}
else {
osAcct = newWindowsOsAccount("S-....", "jdoe", "ACME", host)
}
}
catch (NotUserSIDException ex) {
// Ignore this SID
}
// Pass in osAcct when making artifacts and files

Parsing OS Configuration Data

When parsing the Windows registry or other OS Configuration file, you may find updated information about OS accounts. You can call various org.sleuthkit.datamodel.OsAccountManager methods to get and update the accounts. When adding extended attributes, you can choose to limit the scope of the attribute to the single host being parsed or to the domain-level.

You should make sure to call org.sleuthkit.datamodel.OsAccountManager.newOsAccountInstance() to ensure it is recorded that there was at least some reference to account on that data source. Otherwise, it will not be associated with the data source unless there were also files or artifacts that were mapped to the OS account.


Copyright © 2011-2021 Brian Carrier. (carrier -at- sleuthkit -dot- org)
This work is licensed under a Creative Commons Attribution-Share Alike 3.0 United States License.