SlideShare a Scribd company logo
Digital forensics with Kali Linux
Marco Alamanni
Video 3.3
Extracting and analyzing browser,
email and IM artifacts
In this Video, we are going to take a look at…
• Extracting artifacts from most common browsers: Internet Explorer, Firefox
and Chrome.
• Extracting artifacts from the most common email clients: Outlook and
Thunderbird.
• Extracting artifacts from a popular Instant Messaging (IM) client: Skype
Artifacts from MS Internet Explorer
●
MS Internet Explorer (IE) is the default browser on Windows.

IE stores its data both in Registry keys and in files under the user’s profile
directory.

Typed URLs, form autocompletes and preferences are stored in registry keys
under: HKEY_CURRENT_USERSoftwareMicrosoftInternet Explorer​ .
Artifacts from MS Internet Explorer
Favorites are located in the same folder accross all versions of Windows:
%USERPROFILE%Favorites.
●
Before IE version 10, browser history, cache and cookies are stored in index.dat
files in the following locations:
•
History:
- Win Xp:
%USERPROFILE%Local SettingsHistoryhistory.ie5index.dat
- Win Vista and above:
%USERPROFILE%LocalMicrosoftWindowsHistory
History.IE5index.dat
Artifacts from MS Internet Explorer
•
Cache:
- Win XP:
%USERPROFILE%Local SettingsTemporary Internet FilesContent.ie5​
index.dat
- Win Vista and above:
%USERPROFILE%LocalMicrosoftWindowsTemporary Internet
FilesContent.IE5index.dat
•
Cookies:
- Win XP: %USERPROFILE%Cookiesindex.dat
- Win Vista and above:
%USERPROFILE%RoamingMicrosoftWindowsCookiesindex.dat​
Artifacts from MS Internet Explorer
●
With version 10 and above, IE stores data in ESE (Extensible Storage Engine)
database files. Its location is:
%USERPROFILE%LocalMicrosoftWindowsWebCacheWebCacheV01.dat.
●
To read and extract ESE databases, we have to install a package called Libesedb.
●
Open source tools to analyze ESE files not available on Linux; free tools
available for Windows from NirSoft and Mandiant
Artifacts from Mozilla Firefox
●
Firefox and Chrome both store most of their data in SQLite database files.
●
Firefox stores its data in the following files:
•
History and bookmarks: places.sqlite
•
Cookies: cookies.sqlite
•
Downloaded files: downloads.sqlite
•
Form autocompletes: formhistory.sqlite
Artifacts from Mozilla Firefox
●
Firefox locations:
•
Win XP and older: %APPDATA%MozillaFirefox
•
Win Vista and newer: %APPDATA%LocalMozillaFirefox
•
Linux: /home/{username}/.mozilla/firefox​
Artifacts from Google Chrome
●
Chrome stores its database files under the following locations:
•
Win XP and older: %APPDATA%GoogleChrome
●
Win Vista and newer: %APPDATA%LocalGoogleChrome
●
Linux: /home/{username}/.config/google-chrome/
Artifacts from MS Outlook
●
Ms Outlook stores its data in Personal Storage Table
(PST) files, located as follows:
•
Win XP and older: %APPDATA%MicrosoftOutlook
•
Win Vista and newer: %APPDATA%RoamingMicrosoftOutlook
Artifacts from Mozilla Thunderbird
●
Mozilla Thunderbird stores data in mbox, a plain text format, in the following
directories:
•
Win XP and older: %APPDATA%Thunderbird
•
Win Vista and newer: %APPDATA%RoamingThunderbird
•
Linux: /home/{username}/.thunderbird
Artifacts from Skype
●
Skype keeps data in SQLite databases, most in main.db, in the following
locations:
•
Win XP and older: %APPDATA%Skype{Skype_profile}
•
Win Vista and newer: %APPDATA%RoamingSkype{Skype_profile}
•
Linux: /home/{username}/.Skype/{Skype_profile}
Next Video
File analysis tools
Ad

More Related Content

What's hot (13)

Hosts setup
Hosts setupHosts setup
Hosts setup
dragoj
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5
Brent Muir
 
CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01
dpd
 
Kernel for Word Recovery
Kernel for Word RecoveryKernel for Word Recovery
Kernel for Word Recovery
neiljohn1
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
Brent Muir
 
Tutorial 1 - Browser Basics
Tutorial 1 - Browser BasicsTutorial 1 - Browser Basics
Tutorial 1 - Browser Basics
dpd
 
Web browsers
Web browsersWeb browsers
Web browsers
camilobuelvasr
 
File and directory
File and directoryFile and directory
File and directory
Sunil Kafle
 
Data loader.ppt
Data loader.pptData loader.ppt
Data loader.ppt
ChethanGowdaCoorg
 
File handling
File handlingFile handling
File handling
RoshanMaharjan13
 
BROWSERS!
BROWSERS!BROWSERS!
BROWSERS!
kamilasb
 
internet explorer
internet explorerinternet explorer
internet explorer
nisma shaikh
 
Files & folders.38
Files & folders.38Files & folders.38
Files & folders.38
myrajendra
 
Hosts setup
Hosts setupHosts setup
Hosts setup
dragoj
 
SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5SanDisk SecureAccess Encryption 1.5
SanDisk SecureAccess Encryption 1.5
Brent Muir
 
CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01CSCI 16 ~ Tutorial 01
CSCI 16 ~ Tutorial 01
dpd
 
Kernel for Word Recovery
Kernel for Word RecoveryKernel for Word Recovery
Kernel for Word Recovery
neiljohn1
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
Brent Muir
 
Tutorial 1 - Browser Basics
Tutorial 1 - Browser BasicsTutorial 1 - Browser Basics
Tutorial 1 - Browser Basics
dpd
 
File and directory
File and directoryFile and directory
File and directory
Sunil Kafle
 
Files & folders.38
Files & folders.38Files & folders.38
Files & folders.38
myrajendra
 

Similar to Extracting and analyzing browser,email and IM artifacts (20)

ilide.info-windows-10-forensics-os-evidentiary-artefacts-pr_00b18e0f93f119c9e...
ilide.info-windows-10-forensics-os-evidentiary-artefacts-pr_00b18e0f93f119c9e...ilide.info-windows-10-forensics-os-evidentiary-artefacts-pr_00b18e0f93f119c9e...
ilide.info-windows-10-forensics-os-evidentiary-artefacts-pr_00b18e0f93f119c9e...
MoussaFatah
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
Brent Muir
 
Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0
Brent Muir
 
WindowsRegistry.ppt
WindowsRegistry.pptWindowsRegistry.ppt
WindowsRegistry.ppt
AliAshraf68199
 
INTRODUCTION TO WINDOWS.pptx
INTRODUCTION TO WINDOWS.pptxINTRODUCTION TO WINDOWS.pptx
INTRODUCTION TO WINDOWS.pptx
norwinadriatico
 
LinuxForensicsForNon-LinuxFolks.pdf
LinuxForensicsForNon-LinuxFolks.pdfLinuxForensicsForNon-LinuxFolks.pdf
LinuxForensicsForNon-LinuxFolks.pdf
ssusere6dc9d
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Shawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite UtilitesShawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite Utilites
Shawn Keller
 
Windows forensic
Windows forensicWindows forensic
Windows forensic
MD SAQUIB KHAN
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating Applications
Sam Bowne
 
Windows profile how do i
Windows profile how do iWindows profile how do i
Windows profile how do i
proser tech
 
Windows profile
Windows profileWindows profile
Windows profile
proser tech
 
Windows profile
Windows profileWindows profile
Windows profile
proser tech
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits and
Alisa Esage Шевченко
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interaction
DefconRussia
 
How to Recover Word Document
How to Recover Word DocumentHow to Recover Word Document
How to Recover Word Document
Yodot
 
Android forensics an Custom Recovery Image
Android forensics an Custom Recovery ImageAndroid forensics an Custom Recovery Image
Android forensics an Custom Recovery Image
Mohamed Khaled
 
Windows and MacOS software to work more efficiently (2024.02.12, online)
Windows and MacOS software to work more efficiently (2024.02.12, online)Windows and MacOS software to work more efficiently (2024.02.12, online)
Windows and MacOS software to work more efficiently (2024.02.12, online)
Olivian Breda - Date Insuficiente SRL
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Edubooktraining
EdubooktrainingEdubooktraining
Edubooktraining
norhloudspeaker
 
ilide.info-windows-10-forensics-os-evidentiary-artefacts-pr_00b18e0f93f119c9e...
ilide.info-windows-10-forensics-os-evidentiary-artefacts-pr_00b18e0f93f119c9e...ilide.info-windows-10-forensics-os-evidentiary-artefacts-pr_00b18e0f93f119c9e...
ilide.info-windows-10-forensics-os-evidentiary-artefacts-pr_00b18e0f93f119c9e...
MoussaFatah
 
Windows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary ArtefactsWindows 10 Forensics: OS Evidentiary Artefacts
Windows 10 Forensics: OS Evidentiary Artefacts
Brent Muir
 
Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0Windows 8.x Forensics 1.0
Windows 8.x Forensics 1.0
Brent Muir
 
INTRODUCTION TO WINDOWS.pptx
INTRODUCTION TO WINDOWS.pptxINTRODUCTION TO WINDOWS.pptx
INTRODUCTION TO WINDOWS.pptx
norwinadriatico
 
LinuxForensicsForNon-LinuxFolks.pdf
LinuxForensicsForNon-LinuxFolks.pdfLinuxForensicsForNon-LinuxFolks.pdf
LinuxForensicsForNon-LinuxFolks.pdf
ssusere6dc9d
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Shawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite UtilitesShawn's Top 5 Favorite Utilites
Shawn's Top 5 Favorite Utilites
Shawn Keller
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating Applications
Sam Bowne
 
Windows profile how do i
Windows profile how do iWindows profile how do i
Windows profile how do i
proser tech
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits and
Alisa Esage Шевченко
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interaction
DefconRussia
 
How to Recover Word Document
How to Recover Word DocumentHow to Recover Word Document
How to Recover Word Document
Yodot
 
Android forensics an Custom Recovery Image
Android forensics an Custom Recovery ImageAndroid forensics an Custom Recovery Image
Android forensics an Custom Recovery Image
Mohamed Khaled
 
Windows and MacOS software to work more efficiently (2024.02.12, online)
Windows and MacOS software to work more efficiently (2024.02.12, online)Windows and MacOS software to work more efficiently (2024.02.12, online)
Windows and MacOS software to work more efficiently (2024.02.12, online)
Olivian Breda - Date Insuficiente SRL
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Ad

More from Marco Alamanni (7)

Introduction to memory forensics
Introduction to memory forensicsIntroduction to memory forensics
Introduction to memory forensics
Marco Alamanni
 
File carving tools
File carving toolsFile carving tools
File carving tools
Marco Alamanni
 
File carving overview
File carving overviewFile carving overview
File carving overview
Marco Alamanni
 
Introduction to forensic imaging
Introduction to forensic imagingIntroduction to forensic imaging
Introduction to forensic imaging
Marco Alamanni
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
Marco Alamanni
 
Oracle Database Vault
Oracle Database VaultOracle Database Vault
Oracle Database Vault
Marco Alamanni
 
Trust:concetti generali e teoria formale
Trust:concetti generali e teoria formaleTrust:concetti generali e teoria formale
Trust:concetti generali e teoria formale
Marco Alamanni
 
Introduction to memory forensics
Introduction to memory forensicsIntroduction to memory forensics
Introduction to memory forensics
Marco Alamanni
 
Introduction to forensic imaging
Introduction to forensic imagingIntroduction to forensic imaging
Introduction to forensic imaging
Marco Alamanni
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
Marco Alamanni
 
Trust:concetti generali e teoria formale
Trust:concetti generali e teoria formaleTrust:concetti generali e teoria formale
Trust:concetti generali e teoria formale
Marco Alamanni
 
Ad

Recently uploaded (20)

Comprehensive Incident Management System for Enhanced Safety Reporting
Comprehensive Incident Management System for Enhanced Safety ReportingComprehensive Incident Management System for Enhanced Safety Reporting
Comprehensive Incident Management System for Enhanced Safety Reporting
EHA Soft Solutions
 
Solar-wind hybrid engery a system sustainable power
Solar-wind  hybrid engery a system sustainable powerSolar-wind  hybrid engery a system sustainable power
Solar-wind hybrid engery a system sustainable power
bhoomigowda12345
 
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
Ranking Google
 
How to Install and Activate ListGrabber Plugin
How to Install and Activate ListGrabber PluginHow to Install and Activate ListGrabber Plugin
How to Install and Activate ListGrabber Plugin
eGrabber
 
Digital Twins Software Service in Belfast
Digital Twins Software Service in BelfastDigital Twins Software Service in Belfast
Digital Twins Software Service in Belfast
julia smits
 
Bridging Sales & Marketing Gaps with IInfotanks’ Salesforce Account Engagemen...
Bridging Sales & Marketing Gaps with IInfotanks’ Salesforce Account Engagemen...Bridging Sales & Marketing Gaps with IInfotanks’ Salesforce Account Engagemen...
Bridging Sales & Marketing Gaps with IInfotanks’ Salesforce Account Engagemen...
jamesmartin143256
 
Orion Context Broker introduction 20250509
Orion Context Broker introduction 20250509Orion Context Broker introduction 20250509
Orion Context Broker introduction 20250509
Fermin Galan
 
Codingo Ltd. - Introduction - Mobile application, web, custom software develo...
Codingo Ltd. - Introduction - Mobile application, web, custom software develo...Codingo Ltd. - Introduction - Mobile application, web, custom software develo...
Codingo Ltd. - Introduction - Mobile application, web, custom software develo...
Codingo
 
Wilcom Embroidery Studio Crack 2025 For Windows
Wilcom Embroidery Studio Crack 2025 For WindowsWilcom Embroidery Studio Crack 2025 For Windows
Wilcom Embroidery Studio Crack 2025 For Windows
Google
 
Buy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training techBuy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training tech
Rustici Software
 
Welcome to QA Summit 2025.
Welcome to QA Summit 2025.Welcome to QA Summit 2025.
Welcome to QA Summit 2025.
QA Summit
 
Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??
Web Designer
 
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studiesTroubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Tier1 app
 
NYC ACE 08-May-2025-Combined Presentation.pdf
NYC ACE 08-May-2025-Combined Presentation.pdfNYC ACE 08-May-2025-Combined Presentation.pdf
NYC ACE 08-May-2025-Combined Presentation.pdf
AUGNYC
 
Do not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your causeDo not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your cause
Fexle Services Pvt. Ltd.
 
AEM User Group DACH - 2025 Inaugural Meeting
AEM User Group DACH - 2025 Inaugural MeetingAEM User Group DACH - 2025 Inaugural Meeting
AEM User Group DACH - 2025 Inaugural Meeting
jennaf3
 
GC Tuning: A Masterpiece in Performance Engineering
GC Tuning: A Masterpiece in Performance EngineeringGC Tuning: A Masterpiece in Performance Engineering
GC Tuning: A Masterpiece in Performance Engineering
Tier1 app
 
How to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryErrorHow to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryError
Tier1 app
 
Reinventing Microservices Efficiency and Innovation with Single-Runtime
Reinventing Microservices Efficiency and Innovation with Single-RuntimeReinventing Microservices Efficiency and Innovation with Single-Runtime
Reinventing Microservices Efficiency and Innovation with Single-Runtime
Natan Silnitsky
 
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.pptPassive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
IES VE
 
Comprehensive Incident Management System for Enhanced Safety Reporting
Comprehensive Incident Management System for Enhanced Safety ReportingComprehensive Incident Management System for Enhanced Safety Reporting
Comprehensive Incident Management System for Enhanced Safety Reporting
EHA Soft Solutions
 
Solar-wind hybrid engery a system sustainable power
Solar-wind  hybrid engery a system sustainable powerSolar-wind  hybrid engery a system sustainable power
Solar-wind hybrid engery a system sustainable power
bhoomigowda12345
 
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
!%& IDM Crack with Internet Download Manager 6.42 Build 32 >
Ranking Google
 
How to Install and Activate ListGrabber Plugin
How to Install and Activate ListGrabber PluginHow to Install and Activate ListGrabber Plugin
How to Install and Activate ListGrabber Plugin
eGrabber
 
Digital Twins Software Service in Belfast
Digital Twins Software Service in BelfastDigital Twins Software Service in Belfast
Digital Twins Software Service in Belfast
julia smits
 
Bridging Sales & Marketing Gaps with IInfotanks’ Salesforce Account Engagemen...
Bridging Sales & Marketing Gaps with IInfotanks’ Salesforce Account Engagemen...Bridging Sales & Marketing Gaps with IInfotanks’ Salesforce Account Engagemen...
Bridging Sales & Marketing Gaps with IInfotanks’ Salesforce Account Engagemen...
jamesmartin143256
 
Orion Context Broker introduction 20250509
Orion Context Broker introduction 20250509Orion Context Broker introduction 20250509
Orion Context Broker introduction 20250509
Fermin Galan
 
Codingo Ltd. - Introduction - Mobile application, web, custom software develo...
Codingo Ltd. - Introduction - Mobile application, web, custom software develo...Codingo Ltd. - Introduction - Mobile application, web, custom software develo...
Codingo Ltd. - Introduction - Mobile application, web, custom software develo...
Codingo
 
Wilcom Embroidery Studio Crack 2025 For Windows
Wilcom Embroidery Studio Crack 2025 For WindowsWilcom Embroidery Studio Crack 2025 For Windows
Wilcom Embroidery Studio Crack 2025 For Windows
Google
 
Buy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training techBuy vs. Build: Unlocking the right path for your training tech
Buy vs. Build: Unlocking the right path for your training tech
Rustici Software
 
Welcome to QA Summit 2025.
Welcome to QA Summit 2025.Welcome to QA Summit 2025.
Welcome to QA Summit 2025.
QA Summit
 
Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??Serato DJ Pro Crack Latest Version 2025??
Serato DJ Pro Crack Latest Version 2025??
Web Designer
 
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studiesTroubleshooting JVM Outages – 3 Fortune 500 case studies
Troubleshooting JVM Outages – 3 Fortune 500 case studies
Tier1 app
 
NYC ACE 08-May-2025-Combined Presentation.pdf
NYC ACE 08-May-2025-Combined Presentation.pdfNYC ACE 08-May-2025-Combined Presentation.pdf
NYC ACE 08-May-2025-Combined Presentation.pdf
AUGNYC
 
Do not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your causeDo not let staffing shortages and limited fiscal view hamper your cause
Do not let staffing shortages and limited fiscal view hamper your cause
Fexle Services Pvt. Ltd.
 
AEM User Group DACH - 2025 Inaugural Meeting
AEM User Group DACH - 2025 Inaugural MeetingAEM User Group DACH - 2025 Inaugural Meeting
AEM User Group DACH - 2025 Inaugural Meeting
jennaf3
 
GC Tuning: A Masterpiece in Performance Engineering
GC Tuning: A Masterpiece in Performance EngineeringGC Tuning: A Masterpiece in Performance Engineering
GC Tuning: A Masterpiece in Performance Engineering
Tier1 app
 
How to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryErrorHow to Troubleshoot 9 Types of OutOfMemoryError
How to Troubleshoot 9 Types of OutOfMemoryError
Tier1 app
 
Reinventing Microservices Efficiency and Innovation with Single-Runtime
Reinventing Microservices Efficiency and Innovation with Single-RuntimeReinventing Microservices Efficiency and Innovation with Single-Runtime
Reinventing Microservices Efficiency and Innovation with Single-Runtime
Natan Silnitsky
 
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.pptPassive House Canada Conference 2025 Presentation [Final]_v4.ppt
Passive House Canada Conference 2025 Presentation [Final]_v4.ppt
IES VE
 

Extracting and analyzing browser,email and IM artifacts

  • 1. Digital forensics with Kali Linux Marco Alamanni Video 3.3 Extracting and analyzing browser, email and IM artifacts
  • 2. In this Video, we are going to take a look at… • Extracting artifacts from most common browsers: Internet Explorer, Firefox and Chrome. • Extracting artifacts from the most common email clients: Outlook and Thunderbird. • Extracting artifacts from a popular Instant Messaging (IM) client: Skype
  • 3. Artifacts from MS Internet Explorer ● MS Internet Explorer (IE) is the default browser on Windows.  IE stores its data both in Registry keys and in files under the user’s profile directory.  Typed URLs, form autocompletes and preferences are stored in registry keys under: HKEY_CURRENT_USERSoftwareMicrosoftInternet Explorer​ .
  • 4. Artifacts from MS Internet Explorer Favorites are located in the same folder accross all versions of Windows: %USERPROFILE%Favorites. ● Before IE version 10, browser history, cache and cookies are stored in index.dat files in the following locations: • History: - Win Xp: %USERPROFILE%Local SettingsHistoryhistory.ie5index.dat - Win Vista and above: %USERPROFILE%LocalMicrosoftWindowsHistory History.IE5index.dat
  • 5. Artifacts from MS Internet Explorer • Cache: - Win XP: %USERPROFILE%Local SettingsTemporary Internet FilesContent.ie5​ index.dat - Win Vista and above: %USERPROFILE%LocalMicrosoftWindowsTemporary Internet FilesContent.IE5index.dat • Cookies: - Win XP: %USERPROFILE%Cookiesindex.dat - Win Vista and above: %USERPROFILE%RoamingMicrosoftWindowsCookiesindex.dat​
  • 6. Artifacts from MS Internet Explorer ● With version 10 and above, IE stores data in ESE (Extensible Storage Engine) database files. Its location is: %USERPROFILE%LocalMicrosoftWindowsWebCacheWebCacheV01.dat. ● To read and extract ESE databases, we have to install a package called Libesedb. ● Open source tools to analyze ESE files not available on Linux; free tools available for Windows from NirSoft and Mandiant
  • 7. Artifacts from Mozilla Firefox ● Firefox and Chrome both store most of their data in SQLite database files. ● Firefox stores its data in the following files: • History and bookmarks: places.sqlite • Cookies: cookies.sqlite • Downloaded files: downloads.sqlite • Form autocompletes: formhistory.sqlite
  • 8. Artifacts from Mozilla Firefox ● Firefox locations: • Win XP and older: %APPDATA%MozillaFirefox • Win Vista and newer: %APPDATA%LocalMozillaFirefox • Linux: /home/{username}/.mozilla/firefox​
  • 9. Artifacts from Google Chrome ● Chrome stores its database files under the following locations: • Win XP and older: %APPDATA%GoogleChrome ● Win Vista and newer: %APPDATA%LocalGoogleChrome ● Linux: /home/{username}/.config/google-chrome/
  • 10. Artifacts from MS Outlook ● Ms Outlook stores its data in Personal Storage Table (PST) files, located as follows: • Win XP and older: %APPDATA%MicrosoftOutlook • Win Vista and newer: %APPDATA%RoamingMicrosoftOutlook
  • 11. Artifacts from Mozilla Thunderbird ● Mozilla Thunderbird stores data in mbox, a plain text format, in the following directories: • Win XP and older: %APPDATA%Thunderbird • Win Vista and newer: %APPDATA%RoamingThunderbird • Linux: /home/{username}/.thunderbird
  • 12. Artifacts from Skype ● Skype keeps data in SQLite databases, most in main.db, in the following locations: • Win XP and older: %APPDATA%Skype{Skype_profile} • Win Vista and newer: %APPDATA%RoamingSkype{Skype_profile} • Linux: /home/{username}/.Skype/{Skype_profile}
  翻译: