top of page

Private Browsing: What Really Gets Left Behind? and Recovering Deleted Browser Artifacts.

Private Browsing

Private browsing modes in popular browsers like Chrome, Edge, and Firefox promise to leave no trace behind. They prevent history, cookies, and other browsing data from being stored on disk.


However, you know that nothing is truly hidden.

-----------------------------------------------------------------------------------------------------------


How Private Browsing Works

When you open a private browsing window, your browser stops saving data to its usual storage locations. Instead of writing history, cache, and cookies to disk, everything remains in system memory (RAM). The moment you close the browser, this data disappears—at least in theory.


Where Private Browsing Leaves Traces

Even though private browsing tries to keep your activities hidden, data can still leak in the following ways:


1. Memory-Based Artifacts (RAM Dumps, Pagefile, and Hibernation Files)

  • Since private browsing keeps data in memory, it can still be retrieved if a forensic investigator captures a RAM dump before the system shuts down.

  • The pagefile.sys and hiberfil.sys files store virtual memory on disk, potentially containing traces of private browsing sessions.


2. File Opened in External Viewers

  • If you open a downloaded file in an external program like Windows Media Player or Notepad, Windows may log that activity.

  • These logs can appear in LNK (shortcut) files or Windows Event Logs, revealing that a file was accessed—even if its origin remains unknown.


3. Downloads Still Exist

  • Any file you download while in private mode still gets saved on disk.

  • Although the browser won’t keep a download history, timestamps on the file system can indicate when a file was created.


4. Bookmarks and Private Mode Indicators

  • In Firefox,*\*bookmarks added in private mode have empty title and last_visit_date fields*/*.

  • In Chrome, the *\*visit_count is set to 0, and the hidden field is set to 1*/*.

  • These subtle indicators can reveal private browsing activity.


-----------------------------------------------------------------------------------------------------------


What About Tor Browser?

Tor Browser is designed for anonymity and privacy, forcing all activity into private mode. It runs on a modified version of Firefox and stores almost nothing on disk. However, you can still find traces of its use:


  • Execution Artifacts: Tor’s presence can be confirmed through Windows system logs like Prefetch, SRUM, and UserAssist.

  • Tor Installation Folders: If Tor was used, investigators can check for tor.exe and Start Tor Browser.exe in system logs or removable drives.

  • Tor Configuration Files: The State file inside the Tor folder logs version details and the last execution date.

-----------------------------------------------------------------------------------------------------------


How Forensic Investigators Recover Private Browsing Data

  1. Memory Analysis – The most effective way to recover private browsing data is through memory forensics. RAM dumps, hiberfil.sys, and pagefile.sys can contain traces of visited websites.

  2. File and Data Carving – Specialized forensic tools like Magnet Axiom, FTK, and Belkasoft can extract deleted or hidden artifacts from unallocated disk space.

  3. Comparing Memory with Browser Data – Investigators can cross-reference memory data with existing browser databases to find missing pieces of the puzzle.

-----------------------------------------------------------------------------------------------------------


Can You Ever Be Truly Private?

Modern browsers are getting better at hiding private browsing data, but forensic are evolving too. The best way to stay private online is to:


  • Use RAM-only browsing solutions (like Tails OS or live USB operating systems).

  • Avoid downloading files or opening them in external programs.

  • Understand that your activity might still be stored in memory, even if no history appears in the browser.


While private browsing may protect you from casual snooping, it is not foolproof. You have multiple ways to uncover digital footprints—so if you really need privacy, take extra precautions.

-----------------------------------------------------------------------------------------------------------

Recovering Deleted Browser Artifacts.


Browsers hold a treasure trove of data that can be crucial for digital forensics. But here’s the catch—modern browsers now give users advanced privacy options to delete their traces. This makes our job as investigator a bit trickier.


The Challenge of Selective Deletion

In the past, when users cleared their browsing history, it was often an all-or-nothing action. If we knew a browser was being used but found little to no artifacts, we could assume data had been deleted and possibly argue data spoliation.


Now, browsers like Firefox and Chrome allow users to selectively delete data. For example:


  • Clear Recent History: Users can remove only certain types of data (like history but not cookies) and choose a specific timeframe (last hour, today, etc.).

  • Forget About This Site: This option lets users remove all traces of a specific site, including history, downloads, and bookmarks.


We must now look deeper to detect these selective deletions. One trick is to examine databases where records are assigned sequential ID numbers—gaps in the sequence may indicate data was deleted. Firefox’s places.sqlite database is a great example of where to look for such gaps.



Recovering Deleted Browser Data

When artifacts are deleted, all hope is not lost! Here are some effective techniques:

  • Check for Unallocated Data: Deleted records often remain in database unallocated space. Specialized tools can extract this data from both ESE (Extensible Storage Engine) and SQLite databases.


  • SQLite Recovery: Many browsers store data in SQLite databases, and deleted records can persist for a long time. Some of the best tools for recovering deleted SQLite data include:


    • Sanderson Forensics SQLite Recovery (paid)

    • Cellebrite and Oxygen Forensic tools (paid)

    • FQLite (free) – A powerful open-source tool with a user-friendly interface.

  • ESE Database Carving: Internet Explorer and Edge store browsing data in ESE databases. ESECarve tool is an excellent option for recovering deleted entries.

  • Filesystem Carving: Even if a database has been wiped, fragments of the data might still exist in filesystem free space. Tools like Magnet Axiom and Digital Detective Blade support SQLite carving from free space.


Final Thoughts

Privacy settings in modern browsers make it easier for users to cover their tracks, but with the right forensic techniques, deleted data can still be recovered. Whether you're analyzing SQLite or ESE databases, using the right tools can make all the difference.


As forensic analysts, our job isn’t just about finding artifacts—it’s about understanding how and why they were deleted. With these techniques, you’ll be better equipped to uncover the truth hidden beneath the surface.

------------------------------------------------------Dean-------------------------------------


 
 
 
bottom of page