shellbags - Cross-platform shellbag parser

License: Apache 2.0
Microsoft Windows uses a set of Registry keys known as "shellbags"
to maintain the size, view, icon, and position of a folder when using
Explorer. These keys are useful to a forensic investigator. Shellbags
persist information for directories even after the directory is removed,
which means that they can be used to enumerate past mounted volumes,
deleted files, and user actions. Yuandong Zhu, Pavel Gladyshev, and Joshua
James provided a nice overview of the investigative value of shellbags in
"Using shellbag information to reconstruct user activities" [pdf]; however,
they do not describe how to programmatically access the data. Allan S Hay
went into greater detail in his December, 2004 document "MiTeC Registry
Analyser" [pdf], although he also leaves out a thorough analysis of the
format. TZWorks provides an effective closed-source shellbag parser sbag,
but does not explain its algorithm. Yogesh Khatri first described the basic
structure of Windows Shell Items in his blog post for 42 LLC entitled Shell BAG
Format Analysis. Joachim Metz went on to described the binary format of the
Windows Shell Item structures with great detail in Windows Shell Item format
specification [pdf]. This page documents an approach to parsing shellbags in
detail, as well as introduces an open-source, cross-platform shellbag parser.


shellbags-0.5.5-1.fc28.noarch [34 KiB] Changelog by Willi Ballenthin (2013-12-20):
* Release 0.5.5-1
	Verson 0.5.5

Listing created by Repoview-0.6.6-4.el7