Ahmad Tabsh
12180324
Assignment 2
Windows Forensics
What is an SID?
SID is a security Identifier, it has a unique value of variables with different types that
is used to identify a security principal in Windows. SID can belong to users and
groups. It remains constant across all Operating System.
It can be used for many situations such as Trouble Shooting. It can be displayed on
Windows Access List. Also can track a security principal by its SID.
All capability SIDs that the operating system is aware of are stored in the Windows
registry in the following subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClass
es\AllCachedCapabilities
This subkey also contains any capability SID that is added by first-party or third-party
applications. All Capability SIDs begin at S-1-15-3.
Here are most known Windows SID:
All versions of Windows use the following well-known SIDs.
SID Name Description
S-1-0 Null Authority An identifier authority.
S-1-0-0 Nobody No security principal.
S-1-1 World Authority An identifier authority.
A group that includes all users, even anonymous users, and
guests. Membership is controlled by the operating system.
S-1-1-0 Everyone
By default, the Everyone group no longer includes anonymous
users on a computer that is running Windows XP Service Pack
2 (SP2).
S-1-2 Local Authority An identifier authority.
S-1-2-0 Local A group that includes all users who have logged on locally.
Creator
S-1-3 An identifier authority.
Authority
A placeholder in an inheritable access control entry (ACE).
S-1-3-0 Creator Owner When the ACE is inherited, the system replaces this SID with
the SID for the object's creator.
A placeholder in an inheritable ACE. When the ACE is
inherited, the system replaces this SID with the SID for the
S-1-3-1 Creator Group
primary group of the object's creator. The primary group is
used only by the POSIX subsystem.
A group that represents the current owner of the object. When
an ACE that carries this SID is applied to an object, the
S-1-3-4 Owner Rights
system ignores the implicit READ_CONTROL and
WRITE_DAC permissions for the object owner.
Non-unique
S-1-4 An identifier authority.
Authority
S-1-5 NT Authority An identifier authority.
A group that includes all users who have logged on through a
S-1-5-1 Dialup dial-up connection. Membership is controlled by the operating
system.
A group that includes all users that have logged on through a
S-1-5-2 Network network connection. Membership is controlled by the
operating system.
A group that includes all users that have logged on through a
S-1-5-3 Batch batch queue facility. Membership is controlled by the
operating system.
A group that includes all users that have logged on
S-1-5-4 Interactive interactively. Membership is controlled by the operating
system.
A logon session. The X and Y values for these SIDs are
S-1-5-5-X-Y Logon Session
different for each session.
S-1-5-6 Service A group that includes all security principals that have logged
SID Name Description
on as a service. Membership is controlled by the operating
system.
A group that includes all users that have logged on
S-1-5-7 Anonymous anonymously. Membership is controlled by the operating
system.
Enterprise A group that includes all domain controllers in a forest that
S-1-5-9 Domain uses an Active Directory directory service. Membership is
Controllers controlled by the operating system.
A placeholder in an inheritable ACE on an account object or
group object in Active Directory. When the ACE is inherited,
S-1-5-10 Principal Self the system replaces this SID with the SID for the security
principal who holds the account.
A group that includes all users whose identities were
Authenticated authenticated when they logged on. Membership is controlled
S-1-5-11
Users by the operating system.
This SID is reserved for future use.
S-1-5-12 Restricted Code
A group that includes all users that have logged on to a
Terminal Server
S-1-5-13 Terminal Services server. Membership is controlled by the
Users
operating system.
Remote
A group that includes all users who have logged on through a
S-1-5-14 Interactive
terminal services logon.
Logon
An account that is used by the default Internet Information
This
S-1-5-17 Services (IIS) user.
Organization
S-1-5-18 Local System A service account that is used by the operating system.
S-1-5-19 NT Authority Local Service
S-1-5-20 NT Authority Network Service
S-1-5- A user account for the system administrator. By default, it's
21domain- Administrator the only user account that is given full control over the
500 system.
S-1-5- A user account for people who don't have individual accounts.
21domain- Guest This user account doesn't require a password. By default, the
501 Guest account is disabled.
S-1-5-
A service account that is used by the Key Distribution Center
21domain- KRBTGT
(KDC) service.
502
A global group whose members are authorized to administer
the domain. By default, the Domain Admins group is a
S-1-5-
member of the Administrators group on all computers that
21domain- Domain Admins
have joined a domain, including the domain controllers.
512
Domain Admins is the default owner of any object that is
created by any member of the group.
S-1-5- Domain Users A global group that, by default, includes all user accounts in a
SID Name Description
21domain- domain. When you create a user account in a domain, it's
513 added to this group by default.
S-1-5- Domain Guests
A global group that, by default, has only one member, the
21domain-
domain's built-in Guest account.
514
S-1-5-
Domain A global group that includes all clients and servers that have
21domain-
Computers joined the domain.
515
S-1-5- A global group that includes all domain controllers in the
Domain
21domain- domain. New domain controllers are added to this group by
Controllers
516 default.
A global group that includes all computers that are running an
S-1-5-
enterprise certification authority. Cert Publishers are
21domain- Cert Publishers
authorized to publish certificates for User objects in Active
517
Directory.
A universal group in a native-mode domain; a global group in
a mixed-mode domain. The group is authorized to make
S-1-5-21root
Schema Admins schema changes in Active Directory. By default, the only
domain-518
member of the group is the Administrator account for the
forest root domain.
A universal group in a native-mode domain; a global group in
a mixed-mode domain. The group is authorized to make
S-1-5-21root Enterprise
forest-wide changes in Active Directory, such as adding child
domain-519 Admins
domains. By default, the only member of the group is the
Administrator account for the forest root domain.
S-1-5- A global group that is authorized to create new Group Policy
Group Policy
21domain- objects in Active Directory. By default, the only member of
Creator Owners
520 the group is Administrator.
A security group. The intention for this group is to have
delegated write access on the msdsKeyCredentialLink
S-1-5- attribute only. The group is intended for use in scenarios
21domain- Key Admins where trusted external authorities (for example, Active
526 Directory Federated Services) are responsible for modifying
this attribute. Only trusted administrators should be made a
member of this group.
A security group. The intention for this group is to have
delegated write access on the msdsKeyCredentialLink
S-1-5- attribute only. The group is intended for use in scenarios
Enterprise Key
21domain- where trusted external authorities (for example, Active
Admins
527 Directory Federated Services) are responsible for modifying
this attribute. Only trusted administrators should be made a
member of this group.
A domain local group. By default, this group has no members.
S-1-5- Servers in this group have Read Account Restrictions and
RAS and IAS
21domain- Read Logon Information access to User objects in the Active
Servers
553 Directory domain local group.
S-1-5-32- Administrators A built-in group. After the initial installation of the operating
SID Name Description
system, the only member of the group is the Administrator
account. When a computer joins a domain, the Domain
Admins group is added to the Administrators group. When a
544
server becomes a domain controller, the Enterprise Admins
group also is added to the Administrators group.
A built-in group. After the initial installation of the operating
system, the only member is the Authenticated Users group.
S-1-5-32-
Users When a computer joins a domain, the Domain Users group is
545
added to the Users group on the computer.
A built-in group. By default, the only member is the Guest
account. The Guests group allows occasional or one-time
S-1-5-32-
Guests users to log on with limited privileges to a computer's built-in
546
Guest account.
A built-in group. By default, the group has no members.
Power users can create local users and groups; modify and
delete accounts that they have created; and remove users from
S-1-5-32-
Power Users the Power Users, Users, and Guests groups. Power users also
547
can install programs; create, manage, and delete local printers;
and create and delete file shares.
A built-in group that exists only on domain controllers. By
default, the group has no members. By default, Account
Operators have permission to create, modify, and delete
accounts for users, groups, and computers in all containers
S-1-5-32- Account and organizational units of Active Directory except the
548 Operators Builtin container and the Domain Controllers OU. Account
Operators don't have permission to modify the Administrators
and Domain Admins groups, nor do they have permission to
modify the accounts for members of those groups.
A built-in group that exists only on domain controllers. By
default, the group has no members. Server Operators can log
S-1-5-32-
Server Operators on to a server interactively; create and delete network shares;
549
start and stop services; back up and restore files; format the
hard disk of the computer; and shut down the computer.
A built-in group that exists only on domain controllers. By
S-1-5-32- default, the only member is the Domain Users group. Print
Print Operators
550 Operators can manage printers and document queues.
A built-in group. By default, the group has no members.
Backup Operators can back up and restore all files on a
S-1-5-32- Backup computer, regardless of the permissions that protect those
551 Operators files. Backup Operators also can log on to the computer and
shut it down.
SID Name Description
A built-in group that is used by the File Replication service on
S-1-5-32- domain controllers. By default, the group has no members.
Replicators
552 Don't add users to this group.
A built-in group that grants complete and unrestricted access
S-1-5-32- Storage Replica
to all features of Storage Replica.
582 Administrators
An SID that is used when the NTLM authentication package
NTLM
S-1-5-64-10 authenticated the client.
Authentication
SChannel
An SID that is used when the SChannel authentication
S-1-5-64-14 Authentication package authenticated the client.
An SID that is used when the Digest authentication package
Digest
S-1-5-64-21 authenticated the client.
Authentication
S-1-5-80 NT Service An NT Service account prefix.