Link Files are Windows shortcut files created automatically by the Windows operating system whenever a user accesses a local or remote file or document. These files, however, can also be created manually by the user. LNK files can point to executables or any other file on the system acting as a direct link to access the original file and they end with “.LNK” extension.
LNK files are excellent sources of evidentiary information during investigations. They typically contain
metadata about accessed files and documents, including the file name, size, the path to the target file,
timestamps (for the original file and the LNK file itself), volume and system information (including volume
name, serial number, NetBIOS name and MAC address), and network information (ex. network share path).
All of this information can be extremely valuable to investigators, especially, when attempting to gain a
better understanding of the suspect’s activity on the system such as program execution, file opening, as
well as malicious code execution. In addition, LNK files have proven to be helpful when investigating files
that may no longer exist on the system as the artifacts persist even after the source files are removed from
the system.
The LNK shortcut files follow the Shell
Link Binary File Format [MS-SHLLINK]. These files are scattered throughout the file system;
however, they are found primary on the following locations:
Windows XP:
This section discusses how to use ArtiFast Windows to analyze Link File artifact from Windows
machines and what kind of digital forensics insight we can gain from the artifact.
After you have created your case and added evidence for the investigation, at the Artifacts Selection phase,
you can select Link File artifact:
Once ArtiFast parser plugins complete processing artifacts for analysis, it can be reviewed via “Artifact View” or “Timeline View”, with indexing, filtering, and searching capabilities. Below is a list of the details you can view using Link File artifact in ArtiFast Windows.
Link File Artifact
For more information or suggestions please contact: asmaa.elkhatib@forensafe.com