top of page

Artifacts for file download Part 2: Firefox || Internet Explorer || Chrome.

Tools of Analysis: DB Browser for SQLite/SQLciper

Armed with the "DB Browser for SQLite," forensic investigators gain a powerful lens into the browsers artifact. This tool, available for download at sqlitebrowser.org, empowers analysts to navigate and dissect the SQL database seamlessly.

For a visual guide, the YouTube tutorial here offers step-by-step insights.


Unveiling the Downloads. SQLite Artifacts

Upon accessing the Downloads. SQLite database, forensic analysts can extract a wealth of information:

  • Filename, Size, and Type: Details of each downloaded file.

  • Download and Referring Page: Insight into the source of downloads.

  • File Save Location: The directory where downloaded files are stored.

  • Application Used: Information on the application used to open downloaded folders.

  • Download Start and End Times: Temporal details capturing when downloads occurred.

-------------------------------------------------------------------------------------------------------------


1. Firefox

To access the repository of Firefox artifacts,


command :- cd %USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\


serves as our gateway. Further exploration reveals a directory named

<random text>.default,

within which lies the SQL database, a treasure trove of information waiting to be unearthed.


------------------------------------------------------------------------------------------------------------


2. Index.dat/ Places. SQLite: Tracing Internet Explorer Adventures

Internet Explorer, though evolving, still retains artifacts crucial for forensic scrutiny.


command : - cd %userprofile%\AppData\Local\Microsoft\Windows\History\Low\History.IE5\


leads investigators to the Index.dat/Places.SQLite repository. Here, details for each local user account are stored, recording the frequency of visits to specific locations


-----------------------------------------------------------------------------------------------------------


3. Chrome Chronicles:


Chrome, a modern-day browser juggernaut, leaves its mark on digital landscapes.


Command :- cd %userprofile%\AppData\Local\Google\Chrome\User Data\Default\ 


unravels the Chrome artifact. Forensic investigators can gather a variety of artifacts, including:

-------------------------------------------------------------------------------------------------------------


Tools for collection these artifacts:


  1. Unleashing Kape: A Forensic Powerhouse

For a comprehensive approach to artifact gathering, Kape emerges as a potent tool. With its versatility, Kape can efficiently collect browser artifacts, providing investigators with a unified dataset for analysis.


2. Taking Artifacts Home: A Command of Copy(Manually copying artifacts)

Whether using Kape or opting for a manual approach, the command


Command :- copy "C:\Users\<YourUsername>\AppData\Local\Google\Chrome\User Data\Default\History" "C:\Path\To\New\Location\HistoryCopy"


allows forensic analysts to copy artifacts for further analysis. The subsequent use of SQLite3 facilitates in-depth examination


"You can choose any way to collect yo artifacts at end of the day this blog is for information purposes"


As we conclude our forensic exploration into browser artifacts, the significance of each command and tool becomes evident. Firefox, Internet Explorer, and Chrome each contribute a unique chapter to the digital saga. Forensic investigators armed with commands, tools, and methodologies can unlock the secrets within browser histories, painting a vivid picture of user activities in the vast landscape of digital forensics.


37 views0 comments

Comments


bottom of page