top of page

Search Results

497 results found with an empty search

  • Understanding Microsoft Edge Synchronization: A Forensic Perspective

    In today’s digital world, users expect seamless synchronization across multiple devices. Whether switching between a laptop, tablet, or smartphone, having access to the same bookmarks, browsing history, and saved passwords can be incredibly convenient. Microsoft Edge, built on the Chromium engine, offers synchronization capabilities similar to Google Chrome but with a few notable differences. ----------------------------------------------------------------------------------------------------- How Synchronization Works in Edge Unlike Google Chrome , which automatically encourages users to enable sync upon signing in with a Google account , Edge takes a more subtle approach. While users are encouraged to sign in with their Microsoft account, synchronization is not enabled by default . Once enabled, synchronization collects and stores user artifacts in Microsoft cloud storage. When the user logs into Edge on another device, the sync process automatically retrieves the stored data and updates the browse r. ----------------------------------------------------------------------------------------------------- What Gets Synced? Microsoft Edge synchronization covers a variety of data types, but not everything from the browser is included. Data That Gets Synced: Bookmarks  – Websites saved by the user are synchronized across devices. Preferences  – Some browser settings and configurations are synced. Extensions  – Installed browser extensions are shared among synchronized instances. Passwords  – Saved login credentials can be accessed from different devices. Auto-fill Data  – Form-fill details, such as addresses and payment information, are shared. Collections  – A unique Edge feature allowing users to organize links, images, and notes across devices. ----------------------------------------------------------------------------------------------------- Data That Remains Local (Not Synced): Download History  – Files downloaded on one device do not appear on others. Cookies and Cache  – These remain local for performance and security reasons. Keyword Searches (Keyword_search_terms)  – Typed search queries stay on the originating device. Omnibox Data (Shortcuts Database)  – Search suggestions and shortcuts do not sync. Media Engagement & Zoom Levels  – User preferences for specific sites are not shared. Prefetched Data Analytics (Network Action Predictor)  – This stays on individual devices for better performance. ----------------------------------------------------------------------------------------------------- Examining Edge Synchronization Artifacts From a forensic perspective, i nvestigating Edge synchronization requires a deep dive into the Preferences file , which holds key information about user accounts, sync settings, and timestamps . Last sync time Selected artifacts for synchronization Account information (linked Microsoft accounts) Consent to sync status To e xamine sync actions in real-time, forensic analysts can navigate to edge://sync-internals/, which provides live sync diagnostics, including errors and data transfer logs. ----------------------------------------------------------------------------------------------------- Collections: A Unique Edge Feature One standout feature in Edge is Collections , which allows users to group URLs, images, notes, and snippets of text. However, a significant forensic observation is that Collections cannot be cleared remotely. If a user wants to remove them from a device, they must manually delete each collection on that specific device. Collections data is stored in the collectionsSQLite database, found in the Edge user profile under the Collections  folder. Collection creation timestamps Modification history Source URLs of saved items Item order and content ----------------------------------------------------------------------------------------------------- Security & Privacy Considerations Synchronization introduces both security benefits and risks. On one hand, having access to data across multiple devices enhances user convenience. On the other hand, if an attacker gains access to a Microsoft account, they can retrieve all synced data. Additionally, forensic investigators must note that clearing synced data from one device does not immediately remove it from others unless explicitly deleted. ----------------------------------------------------------------------------------------------------- Conclusion For anyone dealing with Edge synchronization, whether from a security, privacy, or forensic analysis perspective, knowing how data is handled is key to making informed decisions about digital traces and potential vulnerabilities. ----------------------------------------------Dean---------------------------------------------

  • Forensic Analysis of Microsoft Edge Collections and IE Mode

    Microsoft Edge introduced Collections , a unique feature that enhances how users organize and save web content. Unlike traditional bookmarks, Collections allow users to group URLs, images, text snippets, and notes  in a structured way. This makes it an invaluable tool for research, productivity, and forensic investigations. ----------------------------------------------------------------------------------------------------------- Where Collection Data is Stored Edge stores Collection data in a dedicated database  called collectionsSQLite, located within the Edge user profile’s Collections folder . This database contains multiple tables that document: %UserProfile%AppDataLocalMicrosoftEdgeUser Data\CollectionscollectionsSQLite Contents of each Collection Time of creation and modification Order of stored items Data origin (URLs, text, images, and notes) Unlike browser history or cookies, Collections are not cleared via Edge’s ‘Clear Browsing Data’  settings. Users must manually delete individual items or entire Collections , which immediately removes them from the database. ------------------------------------------------------------------------------------------------------------- Breaking Down the Collections Database 1. collections Table (Overview of Collections) This table helps forensic investigators get a big-picture  view of the user’s Collections. id – Unique Collection identifier. date_created – Timestamp of when the Collection was made. date_modified – Last modified timestamp. title – User-assigned Collection name. 2. collections_items_relationship Table (Tracking Item Placement) This table links individual items  to their respective Collections. item_id – Foreign key referencing the items table. parent_id – Links items to a specific Collection. position – The order of items within a Collection. 3. items Table (Detailed Information on Collection Items) This is the most critical  table for forensic analysis as it stores detailed item data. id – Unique identifier for each saved item. date_created – When the item was added. date_modified – Last change timestamp. title – Webpage title or user note title. source – The original URL of the saved item. text_content – Contains extracted webpage text, highlighted content, or user annotations. type – Specifies the type of content (website, text, image, annotation). Since users can save a mix of webpage links, snippets, and personal notes , this database provides valuable context for forensic analysis . How to correlate data b/w them Collection table(copy ID)--> paste id in parent_id column of the table collections_items_relationship and copy the item_id --> paste the id into column id of the items Table ------------------------------------------------------------------------------------------------------------- Edge IE Mode: Bridging Old and New Many businesses still rely on outdated web applications that only function properly in Internet Explorer (IE) . To support them while enhancing security, Edge includes IE Mode , which allows users to access legacy sites using the IE Trident MSHTML engine  inside Edge. How IE Mode Works Disabled by default:  Users or administrators must manually enable it. Controlled via Enterprise Tools:  IT teams can enforce IE Mode for intranet sites via a cached XML list. Security Enhancements:  Unlike standalone Internet Explorer, IE Mode runs in a sandboxed environment  for improved security. IE Mode Artifacts and Forensic Implications IE Mode leaves behind artifacts  in both Edge and IE databases, making it essential for forensic investigations: Edge History Database:  Records visits to IE Mode sites. IE WebCacheV Database: * Stores additional browsing history from the legacy engine. Cache & Cookies:  Found under INetCache and INetCookies, similar to old IE versions. Interestingly, clearing Edge browsing data does not remove IE Mode artifacts . However, Edge provides a ------------------------------------------------------------------------------------------------------------- Edge Privacy Features and Data Deletion Microsoft Edge has significantly enhanced privacy controls compared to Chrome. Some key forensic considerations include: Tracking Prevention:  Users can select from three privacy levels – Basic, Balanced (default), or Strict. The selection is recorded in the Preferences file under enhanced_tracking_prevention. Browsing Data Auto-Clear:  Users can configure Edge to clear specific browsing data categories upon exit , a feature missing in Chrome. Forensic Indicators:  The clear_data_on_exit entry in Edge’s Preferences file logs whether data deletion was enabled and if it was later turned off. Key Takeaway for Forensics If expected browsing history or artifacts are missing, checking Edge privacy settings  can explain why some data was deleted automatically. ------------------------------------------------------------------------------------------------------------ Conclusion by knowing where and how Edge stores data, forensic analysts can extract crucial information that might be overlooked when relying solely on traditional browsing history analysis. 🚀 -----------------------------------------Dean--------------------------------------

  • Forensic Analysis (Investigating downloads, Browsers Bookmark, Extensions) of Microsoft Edge (Chromium-Based)

    Back in 2019, Microsoft replaced its EdgeHTML browser engine with Chromium, the open-source project that powers Google Chrome. By switching to Chromium, Edge shares a common foundation with Chrome, meaning the forensic techniques used for Chrome investigations also apply to Edge. Microsoft isn’t just using Chromium; they’re actively contributing to its development. This means that, as long as Microsoft continues to submit changes to the Chromium project rath er than making Edge-specific modifications, forensic tools built for Chrome will seamlessly work with Edge. ------------------------------------------------------------------------------------------------------- Even Edge and Chrome are nearly identical. Microsoft has introduced a few unique features. One of the most intriguing is IE Mode , which allows users to open a tab using the legacy Internet Explorer engine. This feature is mainly aimed at enterprises that still rely on older web applications. Edge maintains the same folder structure as Chrome %UserProfile%\AppData\Local\Microsoft\Edge\User Data Makes it easy to apply existing Chrome forensic methodologies to Edge without major changes. Similarity b/w edge and chrome artifacts: Browser Artifacts Chrome Edge Internet History History History Cache Files data_#, f_###### data_#, f_###### Cookies/Web Storage Cookies/Local Storage/File System/IndexedDB Cookies/Local Storage/File System/IndexedDB Bookmarks Bookmarks, Bookmarks.bak Bookmarks, Bookmarks.msbak Download History History History Auto-Complete/Form History History, Web Data, Login Data, Network Action Predictor History, Web Data, Login Data, Network Action Predictor Installed Extensions Extensions Folder Extensions Folder Session Recovery Session_, Tabs_ Session_, Tabs_ Synchronization Sync Data Folder Sync Data Folder ------------------------------------------------------------------------------------------------------------- Investigating Downloads in Edge Edge records extensive metadata on file downloads. Records are stored in the History database , specifically in the downloads and download_url_chains tables . Key fields in these tables include: current_path/target_path  – Where the file was saved. start_time/end_time  – Timestamps in Webkit format. state  – Whether the download was successful. state Code Code Description 0 In Progress 1 Complete 2 Cancelled 3 Interrupted 4 Blocked danger_type  – Whether the file was flagged as dangerous. Danger type Code Description 0 Not Dangerous 1 Dangerous 2 Dangerous URL 3 Dangerous Content 4 Maybe Dangerous 5 Uncommon Content 6 User Validated 7 Dangerous Host 8 Potentially Unwanted 11 Password Protected 13/14 Sensitive Content interrupt_reason  – Why a download failed (e.g., flagged as malware). Interrupt reason Code Description 0 None 1 File Failed (generic) 2 Access Denied 3 No Space 5 Filename too long 6 File too large 7 Virus Infected 12 Failed Security Check 20 Network Error 40 User Cancelled 41 User Shutdown 50 Browser Crash opened  – Whether the file was opened via the browser’s download manager. last_access_time  – When the file was last opened via the browser. tab_url & tab_referrer_url  – The page that initiated the download. site_url  – The domain from which the download originated. mime_type  – The type of file downloaded. ------------------------------------------------------------------------------------------------------------- Download Chains and Redirects The download_url_chains  table helps reconstruct the sequence of URLs that led to a file being downloaded . This is useful when a website employs multiple redirects to obscure the true origin of a file, a common tactic in phishing and malware distribution. ------------------------------------------------------------------------------------------------------------- Browser Extensions: The Silent Threat Chromium-based browsers, including Edge, support a vast range of extensions. While this is great for customization, it also opens the door to security risks. Rogue extensions are a growing threat, often used to steal data or install malware. Each i nstalled extension is stored in a uniquely named folder (based on an application GUID) within the Edge user data directory. Inside, the manifest.json file contains key details such as: name  – The extension’s official name. description  – A brief summary of its purpose. version  – The installed version. URL & metadata  – Additional information for identifying the extension. While most forensic tools can extract this data, manually reviewing manifest.json can sometimes reveal hidden or misleading details. ------------------------------------------------------------------------------------------------------------- Tools like Hindsight  can automate this process by parsing manifest.json files and displaying installed extensions in an easy-to-read format. ------------------------------------------------------------------------------------------------------------- Browser Bookmarks Bookmarks don’t always take center stage in forensic tools, yet they hold valuable insights into user behavior. These simple shortcuts, created intentionally by users, can reveal frequently visited websites, saved research, and even traces of malicious activity. Why Bookmarks Matter in Digital Forensics Bookmarks serve as personalized navigation aids, offering key details such as: Website of interest  – The exact URL, including any parameters embedded in it. User profile association  – Identifies which user created the bookmark. Timestamps  – Information on when the bookmark was created or last accessed. Google Chrome & Microsoft Edge Chrome and Edge (Chromium-based) store bookmarks in a JSON file  named Bookmarks  (without an extension), making it easy to parse. Additionally, backup versions (Bookmarks.bak or Bookmarks.msbak in Edge) , preserving previous states. Output Bookmark date_added : Uses the Webkit timestamp format. source : Indicates how the bookmark was created (e.g., user-added or imported). url : The saved web address. Forensic Considerations: Look for backup files  (Bookmarks.bak or Bookmarks.msbak) to retrieve deleted bookmarks. Investigate archived versions  of bookmarks stored in snapshot folders: %UserProfile%\AppData\Local\Google\Chrome\User Data\Snapshots %UserProfile%\AppData\Local\Microsoft\Edge\User Data\Snapshots If a user has cleared bookmarks, backup versions might still hold past evidence. Bookmark for other browsers: Browser Bookmark Location(s) Chrome Bookmarks, Bookmarks.bak Edge Bookmarks, Bookmarks.msbak Internet Explorer %UserProfile%\Favorites\*.url Firefox places.sqlite, bookmarks-.jsonlz4 ------------------------------------------------------------------------------------------------------------ Detecting Malicious Bookmarks Bookmarks can sometimes be manipulated by malware, injecting rogue sites without user knowledge. Forensic investigators should look for: Unusually high bookmark creation activity in a short period  (indicating automation or script-based bookmark injection). Bookmarks pointing to phishing pages or known malware-hosting domains. Mismatch between user activity and bookmarks  (e.g., a user primarily visiting tech forums but having multiple financial scam bookmarks). How to Validate Suspicious Bookmarks: Cross-check browser history – Was the site actually visited? Scan the system for malware – Look for persistence mechanisms. Review antivirus logs – Any detections related to browser activity? Final Thoughts Forensic analysis isn’t just about looking at history logs—it’s about understanding user behavior  through every available artifact. And in that regard, bookmarks offer a surprisingly rich source of evidence. ----------------------------------------Dean-------------------------------------------

  • Investigating Firefox Browser Forensics: A Forensic Guide/Browser analysis Book

    Firefox stores extensive user activity data, making it possible to determine browsing history, downloads, bookmarks, and even synchronized data. This guide will walk you through a detailed forensic analysis of Firefox, covering history tracking, filling in evidence gaps, and deep-dive analysis techniques. 1. Determining Sites Visited Review History Data & Search Keywords Firefox stores browsing history in the places.sqlite database, primarily in the moz_places  and moz_historyvisits tables . Analysts can extract and review: URLs visited Associated timestamps visit_type (e.g., direct navigation, link click, bookmark access, etc.) Search keywords stored in the browser’s history Analyze VisitType for Typed URLs Each visit in the moz_historyvisits  table is categorized by a visit_type field . Typed URLs (where a user manually enters a URL) typically have a visit_type value of 1. Identifying these helps differentiate intentional browsing from passive link clicks. Audit prefs.js for Privacy Settings The prefs.js file contains browser configuration settings, including: Whether the user has enabled history synchronization across devices. Modifications in security settings, such as disabled tracking protection or script execution permissions. Check for Evidence of Synchronization Firefox Sync can transfer browsing data across multiple devices. Identifying whether sync is enabled is critical. Clues include: Entries with missing local artifacts (e.g., missing favicon, cache, or cookies). Last 30 days of history being available (as per Firefox Sync’s default settings). Parse Download History Download records are found in the moz_annos table within places.sqlite . Although downloads are not directly synchronized, references to downloaded files (visit_type = 7 ) may exist in synced history data. Audit Bookmarks Bookmarks are stored in places.sqlite (moz_bookmarks table). Analyzing bookmarks can reveal long-term user interests and frequently accessed sites. Look for Other Profiles Firefox allows multiple user profiles, each storing independent browser data. Investigating profiles.ini in the AppData\Roaming\Mozilla\Firefox directory helps locate multiple user profiles, expanding the evidence scope. ------------------------------------------------------------------------------------------------------------- 2. Filling in Evidence Gaps Audit Cache Domains & Specific Files The Firefox cache (cache2 folder) stores images, scripts, and other web resources . Cache analysis helps: Recover deleted browsing activity. Identify sites visited even if history is cleared. Link user activity with timestamps. Review Cookie Domains Cookies (cookies.sqlite) store authentication tokens, user preferences, and tracking data . They provide insight into user interactions, even if history is deleted. Analyze Session Restore Files Firefox automatically saves session data in recovery.jsonlz4 and previous.jsonlz4 under the sessionstore-backups folder. These files help: Identify tabs open before a crash or shutdown. Recover browsing sessions even after history is cleared. Analyze Form History Entries User-entered form data is stored in formhistory.sqlite. It contains: Search bar entries. Autofill form inputs (names, addresses, emails, etc.). Review Installed Browser Extensions Add-ons can introduce security vulnerabilities, track user activity, or execute scripts. Investigating extensions.json and the extensions folder helps: Identify malicious extensions. Recover deleted add-ons. Understand potential user modifications to browser behavior. ------------------------------------------------------------------------------------------------------------- 3. Deep Dive Analysis Search Web Storage Firefox uses IndexedDB (storage/default) and webappsstore.sqlite for web applications' local storage. Investigating these can reveal: User credentials (in some cases). Application-specific browsing behavior. Persistent tracking mechanisms. Review Memory-Based Artifacts Memory forensics can uncover transient browser artifacts, including: Private browsing session data. Unencrypted credentials or session tokens. Carve Deleted SQLite Entries Firefox’s SQLite databases do not immediately purge deleted records . Using forensic tools like sqlite3 or Undark can help recover deleted: Browsing history. Cookies. Bookmarks. Review Firefox Jumplist Entries Windows stores Firefox launch and recent file access information in Jumplists (.automaticDestinations-ms and .customDestinations-ms). Analyzing these provides: Evidence of Firefox execution. Recently accessed sites and profiles. Targeted Analysis Using Volume Shadow Copies Recovering old versions of Firefox’s databases using Windows Volume Shadow Copies (vssadmin list shadows) enables: Timeline reconstruction of browser activity. Recovery of deleted history, bookmarks, and settings. ------------------------------------------------------------------------------------------------------------- Browser Artifacts Firefox 3+ Format Internet History places.sqlite SQLite Cache CACHE N/A Cookies / Web Storage cookies.sqlite / storage / webappstore.sqlite SQLite Bookmarks places.sqlite SQLite Download History places.sqlite SQLite Auto-Complete/ Form History formhistory.sqlite / places.sqlite SQLite Installed Extensions extensions.json JSON Session Restore sessionstore.jsonlz4 / sessionstore-backups JSON Preferences / Sync prefs.js JSON ------------------------------------------------------------------------------------------------------------- Conclusion Firefox forensic analysis requires a multi-layered approach . By correlating history, cache, cookies, session data, and memory artifacts, investigators can piece together a user’s browsing activity. Tools for Firefox Forensics: SQLite Browsers  (DB Browser for SQLite, Autopsy) Plaso (log2timeline)  for timeline creation MozillaCacheView  for cache analysis Volatility & Rekall  for memory forensics ShadowExplorer  for Volume Shadow Copy analysis By following this structured forensic approach, investigators can extract meaningful evidence, even in cases where users attempt to erase their tracks. 🚀 -------------------------------------------Dean------------------------------------------------

  • Firefox Privacy Settings and Firefox Extensions as well as synchronization: A Forensic Deep Dive

    Mozilla Firefox, one of the most widely used web browsers, offers users extensive customization options, privacy controls, and synchronization capabilities. As for forensic perspective, this will generate crucial artifacts that can provide valuable insights during investigations. -------------------------------------------------------------------------------------------------------- Firefox Privacy Settings & Their Impact on Artifacts Firefox provides users with extensive privacy controls through the about:preferences . These settings influence how browsing data is stored and cleared, impacting the forensic artifacts left behind. Browsing and Download History : Deletes stored history, auto-complete suggestions, and downloads from places.sqlite . Active Logins : Removes all session cookies from memory. Form and Search History : Clears auto-fill data from formhistory.sqlite . Cookies : Deletes saved cookies, including Flash cookies, from cookies.sqlite . Cache : Clears the browser cache directory. Site Preferences : Removes site-specific settings stored in prefs.js . Offline Website Data : Deletes cached offline website data. User preferences regarding privacy settings are saved in the prefs.js file within the Firefox profile folder, which is a crucial file for forensic examination. -------------------------------------------------------------------------------------------------------- Firefox Extensions & Add-ons: A Digital Fingerprint Firefox’s extension ecosystem enables users to enhance their browsing experience , but it also leaves behind digital footprints. Cookie Manipulation Tools (e.g., Cookie Editor) : Could indicate potential tampering with web authentication. Privacy-focused Extensions (e.g., Tor Control) : Suggests possible anonymity-seeking behavior. Where is Extension Data Stored? Modern Versions (Post Firefox 25) : Extensions are now stored in extensions.json , which contains details like: Extension name Installation source Install/update timestamps (PRTime format) Whether the extension was enabled at the time of evidence acquisition Older Versions (Firefox 4-24) : Extensions were previously managed in extensions.sqlite and addons.sqlite. ------------------------------------------------------------------------------------------------------------ Firefox Sync: Synchronization Across Devices Firefox Sync is a powerful feature that allows users to synchronize browsing data across multiple devices, including bookmarks, passwords, history, open tabs, and even installed extensions. How Sync Works Local data is encrypted and uploaded to Mozilla’s sync server. Other devices signed into the same Firefox account can pull and decrypt this data . The sync frequency varies but typically occurs every 10 minutes  or whenever significant changes happen. Users can force an immediate sync through the browser menu. How to Identify Sync Artifacts? Investigators can determine if Firefox Sync is enabled by examining the prefs.js file . Look for entries beginning with services.sync ., including: services.sync.username   → Stores the user’s Firefox account email. services.sync.engine.  (addons, bookmarks, history, passwords, prefs, tabs) * → Indicates what data is being synchronized. signedinuser.json  → Contains sync-related user details. Some additional Sync: services.sync.engine.addons services.sync.engine.bookmarks services.sync.engine.history services.sync.engine.passwords services.sync.engine.prefs services.sync.engine tabs Additionally, client.devices logs the number of devices linked to the Firefox account, categorized by desktop and mobile platforms. Can Sync Data Be Forensically Retrieved? While synced data is encrypted before being sent to Mozilla’s servers, you can still retrieve locally stored data from the browser’s profile folder. For organizations looking to disable sync, settings can be enforced through the Mozilla.cfg  configuration file. What Gets Synced? Browsing History:  The last 30 days of history is synced upon initial sync. Bookmarks:  Saved bookmarks are replicated across devices. Preferences (prefs.js):  Customized browser settings are retained. Form History:  Includes autofill data and saved entries. Add-ons & Extensions:  Installed add-ons and their settings. Logins & Passwords:  Saved credentials. Open Tabs:  Active browsing sessions are accessible from any linked device. What Doesn't Get Synced? Download History:  Although downloads are not explicitly synced, evidence of downloads (visit_type 7 entries) is stored in the moz_historyvisits  table. Cache Data:  Locally stored site content remains device-specific. Favicons:  Icons representing visited sites are not transferred. Webappstore Databases:  Any stored web application data remains local. ------------------------------------------------------------------------------------------------------------- Distinguishing Local vs. Synced Data Firefox does not label whether data originated from a local browsing session or was s ynced from another device , analysts need to look for patterns and anomalies. Here are a few methods to identify synced data: Check visit_type in moz_historyvisits Table: If an entry has a visit_type of 1 (link-followed visit) , the from_visit field should reference a non-zero place_id, indicating the originating page. Look for Missing Data in Certain Tables: Description & preview_image_url Fields:  These fields should contain data in locally visited entries but will often be null for synced ones. Favicons Database (favicons.sqlite):  If a site is visited locally, its favicon should be stored. A missing favicon may indicate a synced entry. Webappstore.sqlite Database:  Synced entries typically lack corresponding data here. Cache2 Folder:  If no cached files exist for a site, it might have been synced rather than visited directly. Check Cookies: Synced sites only store a small subset of cookies, whereas locally visited sites tend to store a large number of cookies. Download History Verification: If an entry in moz_historyvisits  has a visit_type of 7 (download indication)  but lacks a corresponding entry in moz_annos , the download was likely performed on another device. Although exceptions exist, multiple inconsistencies strongly suggest that an entry was synced rather than accessed directly on the device under analysis. ------------------------------------------------------------------------------------------------------------- Identifying Synced Form History Unlike browsing history, form history (autofill data) is nearly impossible to differentiate between local and synced entries . All form history records are stored in formhistory.sqlite , and timestamps for synced entries reflect the synchronization time rather than the original data entry time. Without access to all synced devices, separating local and remote form history entries is extremely difficult. The Impact of Clearing Data When a user manually clears browsing data in Firefox, the following artifacts are removed: places.sqlite (browsing history & bookmarks) formhistory.sqlite (saved form entries) cookies.sqlite (stored cookies) Cache & session-store folders (session data) favicons.sqlite & webappstore.sqlite (site icons & web storage data) Sync Behavior for Deleted Data Clearing data on one device does not  erase it from other synced devices. Forensic analysts should always try to obtain all linked devices, as important evidence might still exist elsewhere. However, there are two exceptions where deletion does  sync across devices: Delete Page:  Removes a specific site’s history from both the local and synced databases. Forget About This Site:  Wipes all traces of a site from both the local system and synced devices. Conclusion Firefox’s sync capabilities may obscure some evidence, but with the right techniques, a skilled investigator can still piece together the full picture ---------------------------------------------Dean----------------------------------------

  • Browser Credential Storage and Forensic Password Recovery

    Before moving ahead very important topic we have to discussed is about credential storage, Lets talk in this article ---------------------------------------------------------------------------------------------------- Web browsers store credentials and other sensitive data for user convenience , but this also introduces security risks. Understanding how browsers manage credential storage, encryption mechanisms like DPAPI, and forensic recovery techniques is crucial for security professionals and incident responders. ---------------------------------------------------------------------------------------------------------- Lets talk first how Chromium-Based and Firefox approach to Credential Storage How Chromium-Based Browsers Store Credentials Chromium-based browsers, including Google Chrome, Microsoft Edge, and Brave, use an SQLite database named Login Data   to store saved credentials This database contains a logins table that records: Website URL (origin_url and action_url) Username and encrypted password Date of creation and last usage Interestingly, even when users select “Never”  in the save password dialog, the browser still logs this decision! These entries appear in the database with blacklisted_by_user = 1, meaning you can still retrieve information about sites the user visited but refused to save passwords for. If the user simply closes the save password prompt without selecting an option, an entry is logged in the stats table, including: origin_domain (Website URL) username_value (Entered username) dismissal_count (Number of times the prompt was closed) update_time (Last dismissal timestamp) Key Takeaways for Forensic Analysis Even unsaved credentials  leave traces in the database. Synchronization across devices means credentials from another device  might appear in local browser files. Firefox’s Approach to Credential Storage Firefox takes a slightly different approach by using a J SON-formatted file  called logins.json. This file stores: Website hostname and form submission URL encryptedUsername and encryptedPassword Timestamps for when credentials were created, last used, and changed Timestamps are stored in Unix epoch milliseconds , allowing you to track user behavior over time. ------------------------------------------------------------------------------------------------------------ Now lets talk about if in case you have windows vault installed Windows provides its own credential management system called Windows Vault  (or Credential Manager), which is used to store passwords for: Internet Explorer Remote Desktop sessions Network shares Various Windows applications Credential data is stored in the following directories: %USERPROFILE%\AppData\Local\Microsoft\Vault\{GUID} %USERPROFILE%\AppData\Roaming\Microsoft\Vault\{GUID} \Windows\System32\config\systemprofile\AppData\Local\Vault\{GUID} \Windows\System32\config\systemprofile\AppData\Roaming\Vault\{GUID} Each credential is stored as a .vcrd file, while the .vpol file contains the encryption keys. ------------------------------------------------------------------------------------------------------------ Firefox Session Restore: A Hidden Treasure Trove Firefox introduced Session Restore  long before other browsers, allowing users to recover their browsing sessions after crashes or updates . This feature logs a wealth of data, including: All open tabs and windows Browser window dimensions and positions Scroll position for each tab Complete tab history Cookies and form data Details of failed downloads Where is This Data Stored? The session restore data is kept in sessionstore.jsonlz4 , a compressed JSON file  in the Firefox profile folder. Interestingly, this file is deleted upon normal browser exit , but you can still recover multiple historical copies  due to the lack of immediate overwriting. Additional backup files exist in the sessionstore-backups folder: recovery.jsonlz4 – Live session tab data recovery.baklz4 – Backup of recovery.jsonlz4 previous.jsonlz4 – Data from the previous browsing session upgrade.jsonlz4- – Session details from the last Firefox update cycle Older Firefox versions used uncompressed files, meaning you may find files like sessionstore.js, recovery.js, and previous.js in legacy cases. ------------------------- Now if you look there are new compression technique used by Firefox Any file with name extended to is seems to be compressed json. lz4 json.mozlz4 baklz4 I know, I know you will say Dean that how can we decompress it so we can get details worry not i am here for you Use tool dejsonlz4.v1.1 command: C:\Users\Akash's\Downloads\dejsonlz4.v1.1\bin-win32>dejsonlz4.exe "C:\Users\Akash's\AppData\Roaming\Mozilla\Firefox\Profiles\8teby4gw.default-release\sessionstore-backups\previous.jsonlz4" "C:\Users\Akash's\Downloads\sessionstore.json" ------------------------------------------------------------------------------------------------------------ Disabling Session Restore: Can Users Cover Their Tracks? While users can disable Session Restore , you can verify these settings in prefs.js  if modifications exist: Firefox 3 and below:  browser.sessionstore.enabled = false Firefox 3.5+:  browser.sessionstore.max_tabs_undo = 0 and browser.sessionstore.max_windows_undo = 0 ------------------------------------------------------------------------------------------------------------ Extracting and Decrypting Browser Passwords Forensic Analysis Tools Tools help in extracting and decrypting browser passwords: Firefox: Use WebBrowserPassView Chome: Use ChromePass ------------------------------------------------------------------------------------------------------------ Now Windows use encryption method called DPAPI The Data Protection API (DPAPI)  is a Windows encryption mechanism that secures stored passwords. Chrome and Edge rely on DPAPI to encrypt credentials. DPAPI encryption is tied to the user’s Windows login credentials . If an attacker gains access to a user’s Windows profile, they can potentially decrypt stored passwords. DPAPI Master Key Extraction The DPAPI master key is stored in: C:\Users\\AppData\Roaming\Microsoft\Protect\\ ------------------------------------------------------------------------------------------------------------ Final Thoughts: What This Means for Security & Forensics From a security perspective, browser credential storage is a double-edged sword . While it improves convenience for users, it also creates a goldmine of forensic evidence . Investigators can: Extract saved usernames and metadata even if passwords are encrypted. Recover browsing history even after deletion via session restore files. Identify websites where users attempted to log in but chose not to save passwords. How Users Can Protect Themselves Use a password manager  instead of browser-stored credentials. Regularly clear session restore data  and disable unnecessary features. Turn on full-disk encryption  to protect local credential databases. Avoid syncing passwords across devices  if security is a concern. For forensic analysts, understanding where browsers store credentials and session data is key to uncovering crucial evidence in investigations. With browsers continuously evolving, staying up-to-date with storage mechanisms is essential for both investigators and security-conscious users. ------------------------------------------Dean---------------------------------------

  • Firefox Cookies/ Download History/ Auto-Complete Data : A Forensic Perspective

    Web browsers are treasure troves of digital artifacts, often holding crucial evidence in forensic investigations. Among them, Mozilla Firefox stands out with its rich history storage, cookie management, and download tracking. ------------------------------------------------------------------------------------------------------------- Why Firefox Artifacts Matter in Investigations Each browser artifact stores different aspects of a user's online activity. There’s no single file that contains everything an investigator needs. For example, while the history file shows visited websites, cookies can reveal additional sites, login sessions, and even data from deleted history records. Firefox collects and stores these digital footprints in structured SQLite databases, making forensic analysis more streamlined yet requiring proper querying techniques. ------------------------------------------------------------------------------------------------------------- Tracking Cookies: The Hidden Trail of User Activity Cookies are small files websites use to store session details, login tokens, and user preferences. Unlike history files, cookies often persist longer and provide information even after users delete their browsing history. Firefox Cookie Storage Firefox consolidates all cookies into a single SQLite database named cookies.sqlite . This database stores: Cookie name  – Identifies the specific cookie Domain/Host  – The website that created the cookie Value  – The data stored within the cookie Creation and last accessed times  – Useful for timeline analysis Analyzing Cookies with NirSoft MZCookiesView One of the easiest ways to examine Firefox cookies is by using MZCookiesView, a free tool by NirSoft. Investigators can: Load the cookies.sqlite file Sort and filter cookies by domain, value, or timestamp View detailed cookie properties by right-clicking any entry Cookies can reveal previously accessed sites, user preferences, and authentication tokens that might still be valid. ------------------------------------------------------------------------------------------------------------- Question you must asked while investigating cookies: Investigative Questions cookies.sqlite What website domain issued the cookie? host What is the cookie name? name Should the cookie only be sent in encrypted sessions? isSecure What values/preferences were stored? value When was the cookie created? creationTime When was the cookie/site last accessed? lastAccessed ------------------------------------------------------------------------------------------------------------- Firefox Download History: What Files Were Accessed? Firefox maintains a detailed log of every file downloaded by a user. This artifact is crucial for tracking malicious activities or identifying unauthorized data transfers. Where is Download History Stored? Before Firefox 26  – Downloads were stored in a dedicated database, downloads.sqlite. (Things to look for table below) Investigative Questions downloads.sqlite What was the file name? name What was the file type? mimeType Where was the file downloaded from? source What was the referring page? referrer Where was the file saved? target What application was used to open the file? preferredApplication When did the download start? startTime When did the download end? endTime How large was the download? maxBytes Was the download successful? state Firefox 26 and later  – Download history was merged into places.sqlite , making investigations more complex. (Things to look for table below) Investigative Questions places.sqlite Table: moz_annos What was the filename? place_id (ref. moz_places) Where was the file downloaded from? place_id (ref. moz_places) Where was the file saved? content (file:///) When did the download end? content (endTime) How large was the download? content (fileSize) Was the download successful? content (state) Extracting Download Information To analyze download history in places.sqlite, forensic investigators should focus on: moz_annos Table  – Stores metadata, including download location, status, and timestamps (in PRTime format use dcode to parse the time). moz_places Table  – Holds URLs associated with downloads (identified by place_id). Co-relation: A download is marked successful with state = 1. If a user cancels or encounters an error, different state values are assigned: 2 = Error occurred, download aborted 3 = Download canceled 4 = Download paused Identifying Default and Last Used Download Folders Firefox records the user's preferred download directory in the prefs.js file within the profile folder. The settings include: browser.download.dir – The default download folder. browser.download.lastDir – The last folder used for downloads. The default location is typically %UserProfile%\Downloads\, but users often change it. Easier way below Using NirSoft FirefoxDownloadsView The FirefoxDownloadsView tool allows easy examination of download history, showing filenames, source URLs, timestamps, and file locations. ------------------------------------------------------------------------------------------------------------- Auto-Complete Data: What Was Typed? Auto-complete data provides a fascinating insight into what users have typed into forms, search bars, and login fields. This includes: Email addresses Usernames Search queries Personal details like addresses and phone numbers Firefox Auto-Complete Storage Firefox stores auto-complete data in formhistory.sqlite, logging: Field name  (e.g., email, username) Value entered Number of times used First and last used timestamps This artifact is particularly useful when tracking user intent and potential account credentials. However, since auto-filled data isn’t tied to specific websites, timestamps must be correlated with browsing history for better accuracy. Converting Firefox Timestamps Firefox timestamps use PRTime format, which represents time in microseconds since January 1, 197 0. To convert them into a readable format, forensic tools like DCode can be used. Investigative Questions formhistory.sqlite What type of form was the data entered into? fieldname What was the data typed by the user? value How many times has the value been used? timesUsed When was the data first typed in? firstUsed When is the last time the data was used? lastUsed ----------------------------------------------------------------------------------------------------------- Conclusion: Piecing the Puzzle Together Forensic analysis is all about correlation—no single artifact tells the full story. Combining multiple artifacts and timeline analysis is key to uncovering the truth. -----------------------------------------------Dean-----------------------------------------------------

  • Firefox Cache: A Forensic Perspective include parsing

    Firefox cache can be a goldmine of evidence. T his cache stores web pages, images, and files locally to improve browsing speed, providing forensic investigators with a window into the user’s browsing history and downloaded content. --------------------------------------------------------------------------------------------------------- Why Firefox Cache Matters in Forensics The cache isn’t just a list of visited websites —it contains actual content files retrieved during web sessions. This means an examiner can recover cached web pages, media files, and other internet artifacts even if the user tries to delete their history. Additionally, metadata stored in the cache provides timestamps, helping to establish a timeline of online activities. --------------------------------------------------------------------------------------------------------- Cache Storage and Size Variations Firefox cache sizes vary depending on the browser version. Earlier versions (pre-4.0) had a fixed cache size of 50MB, while modern versions allow dynamic cache sizing based on available system resources, sometimes reaching up to 1GB. Investigators can check cache size configurations in the prefs.js file by looking for the browser.cache.disk.capacity  value. However, this setting only appears if the user has manually modified the default values. C:\Users\Akash's\AppData\Roaming\Mozilla\Firefox\Profiles\8teby4gw.default-release To manually inspect cache settings, type about:config  in the Firefox address bar. --------------------------------------------------------------------------------------------------------- Cache Storage Locations The cache storage structure has changed significantly over time. Understanding these changes is crucial for forensic investigations. For older systems like Windows XP, the location was: %UserProfile%\Local Settings\Application Data\Mozilla\Firefox\Profiles\.default\Cache The cache structure in these versions was complex , requiring specialized tools to parse. The cache files were divided into different components: Cache Map : The index file that tracks stored cache entries. Cache Block Files (CACHE_001, CACHE_002, etc.) : Containers storing multiple cached files and metadata. Cache Data Files : Randomly named files created when content was too large for Cache Block files. Firefox Versions Before 32 Before Firefox 32, the cache was stored in: %UserProfile%\AppData\Local\Mozilla\Firefox\Profiles\.default\Cache Firefox 32 and Later Mozilla introduced a new, simplified cache structure in Firefox 32 for improved speed and flexibility . The cache is now stored in: %UserProfile%\AppData\Local\Mozilla\Firefox\Profiles\.default\cache2\entries Each cached file is stored individually, making it easier for forensic analysis. Unlike older versions, no additional database is needed to map cache entries. Metadata is directly appended to each cached file. Key Metadata in Firefox Cache Forensic investigators can extract the following details from Firefox cache: Attribute Description URL Identifies the website the cached content originates from. Fetch Count Indicates how often a cached file has been accessed. Missing Status Shows whether the cached file still exists or has been purged due to cache control settings. Filename The original name of the downloaded content. Content Type Specifies the type of file stored (HTML, JavaScript, images, etc.). File Size Reveals the size of the cached content. Last Modified Time Records when the file was last updated in the cache. Last Fetched Time Shows the last time the cached content was accessed, indicating recent visits. Response Header Stores the full HTTP header, which includes encoding details, cache control settings, server information, and timestamp. Analyzing Firefox Cache Files Investigators can manually examine Firefox cache by navigating to the cache directory and reviewing stored files. Since metadata is appended to each cached file in modern versions, tools like strings or hex editors can extract useful details. However, automated tools like MozillaCacheView  and FTK Imager  streamline the process by presenting a structured view of cache entries. ----------------------------------------------------------------------------------------------------------- Tools for parsing and analyzing cache MZCacheView: A User-Friendly Solution for Cache Analysis One of the most effective tools for parsing Firefox cache files is MZCacheView , previously known as MozillaCacheView. This lightweight utility from NirSoft extracts and presents cache data in an easy-to-read format. Column important to analyses in MZCacheview: Attribute Description File name The name of the downloaded file. Content type Indicates the file format (e.g., HTML, PNG, JSON). URL The specific web address the file originated from. File size The size of the stored file. Fetch count Number of times the file has been retrieved from the cache. Last modified The timestamp indicating when the file was cached. Last fetched The most recent time the file was accessed. Expiration time The server-defined expiry date for the cached file. Encoding type Specifies whether the content was compressed (e.g., Gzip). Server details Metadata from the HTTP response, including server name, last modified date, ETag, and response code. Key Features of MZCacheView: ✔ Displays all cached files with metadata. ✔ Provides filtering options for targeted analysis. ✔ Exports selected files for further investigation. ✔ Helps reconstruct browsing activity. Using MZCacheView for Forensics: Close Firefox:  Since cache files are locked when Firefox is running, ensure the browser is closed before analysis. Launch MZCacheView:  Open the tool and let it automatically detect and list cache entries. Filter and analyze:  Sort results based on file type, URL, or modification time. Export relevant files:  Extract necessary cache entries for further review. By using this tool, analysts can piece together a user's web activity, including visited sites, downloaded files, and accessed resources. ----------------------------------------------------------------------------------------------------------- Rebuilding Webpages from Cache: A Hidden Goldmine Beyond just extracting cached files, some forensic tools can reconstruct entire webpages from stored data . This capability allows investigators to see exactly what a user saw at a given time , even if the original webpage has changed or been deleted. Popular Tools for Webpage Reconstruction: ✔ Foxton Browser History Examiner  - Offers in-depth cache analysis and webpage rebuilding. ✔ AXIOM  - A commercial tool used for advanced browser forensics. ✔ NetAnalysis  - Specializes in browser history and cache reconstruction. By isolating cached elements like HTML, CSS, and JavaScript, these tools recreate snapshots of previously visited sites. This is especially useful in cases where a suspect accessed a webpage that no longer exists. ----------------------------------------------------------------------------------------------------------- Final Thoughts Whether using MZCacheView  for a user-friendly approach automation, these tools help forensic analysts piece together digital trails effectively. With proper techniques and best practices, investigators can turn browser cache data into compelling evidence in digital investigations. ---------------------------------------------Dean------------------------------------------------------

  • Firefox Browser History for Forensic Investigations

    When investigating digital evidence, a browser’s history can be a goldmine of information. Firefox, like other modern browsers, maintains extensive records of user activity, storing this data in the places.sqlite database . This database can provide critical insights into a user’s online behavior, revealing visited websites, timestamps, and other relevant metadata. ----------------------------------------------------------------------------------------------------------- Understanding Firefox History Storage Firefox originally stored browsing history for a fixed 90-day period, but since version 4, the duration is dynamically determined based on system resources. T his means history data can span months or even years, sometimes reaching hundreds of thousands of entries. Key Tables in places.sqlite To extract meaningful information, investigators must focus on two primary tables: moz_places : Contains URLs, visit counts, titles, and metadata related to web visits. moz_historyvisits : Stores detailed records of each visit, including timestamps, referrers, and visit types. ----------------------------------------------------------------------------------------------------------- Extracting Useful Information Identifying Frequently Visited Sites The v isit_count column in moz_places  helps determine which sites a user visited most frequently. Pages with a visit count greater than one suggest intentional and repeated access. Creating a Timeline of Activity Each visit to a webpage is recorded in moz_historyvisits, and the visit_date  field provides timestamps. By sorting entries by date, analysts can track user activity over specific time frames. Determining User Intent The typed field in moz_places  indicates if the URL was manually entered. The f rom_visit attribute reveals the previous page that led to the current visit. The visit_type field categorizes how a page was accessed. ------------------------------------------------------------------------------------------------------------- Co-relating data from moz-place to moz_history visit to get an timestamp ------------------------------------------------------------------------------------------------------------ Decoding the visit_type Field The visit_type field in moz_historyvisits  provides insight into why a URL was recorded: Type Description 1 User followed a link, and the page was loaded 2 User typed the URL to get to the page (with or without auto-complete) 3 User followed a bookmark to get to the page 4 Indicates some inner content was loaded, such as images and iframes 5 Page accessed due to a permanent redirect (HTTP 301 status code) 6 Page accessed due to a temporary redirect (HTTP 302 status code) 7 File indicated by history was downloaded (non-HTML content) 8 User followed a link that loaded a page in a frame 9 Page was refreshed/reloaded ------------------------------------------------------------------------------------------------------------ Handling PRTime Timestamps Firefox stores timestamps in PRTime format (microseconds since January 1, 1970). To convert a value like 1736802810848000 to a readable format, analysts can use tools like SQLite queries, Python scripts, or online converters. or Using NirSoft BrowsingHistoryView for Analysis While manually parsing the places.sqlite database provides deep insights, tools like NirSoft’s BrowsingHistoryView streamline the process: Mount Evidence : Point the tool to the browser profile stored in forensic images or live systems. Review Data : Filter and analyze history entries from multiple browsers in one interface. Export Findings : Save reports in text or HTML formats for documentation. ------------------------------------------------------------------------------------------------------------ Final Thoughts Firefox’s history database is an invaluable asset for digital investigations. By leveraging both manual database queries and forensic tools, analysts can reconstruct online activity with precision . Understanding how this data is structured and retrieved allows for effective forensic analysis, ultimately helping to establish patterns, verify timelines, and uncover digital evidence. --------------------------------------------Dean-----------------------------------------------

  • Firefox Browser Forensics Series: Lets Start

    I Personally use Mozilla Firefox with increased security Mozilla Firefox is a widely used open-source browser backed by the Mozilla Foundation, known for its strong emphasis on privacy and customizability. Unlike other browsers, Firefox is designed with transparency in mind, making it a favorite among security-conscious users and forensic analysts alike . ----------------------------------------------------------------------------------------------------------- Understanding Firefox’s File Structure Firefox organizes user data into a profile-based structure. Each user profile contains all the necessary browser artifacts, including history, cache, cookies, bookmarks, and more. On Windows systems, these profiles are stored in: C:\Users\\AppData\Roaming\Mozilla\Firefox\Profiles\.default %UserProfile%\Local Settings\Application Data\Mozilla\Firefox\Profiles\.default\Cache The < random text>.default folder is unique to each installation and user profile . If multiple profiles exist, investigators must check each profile folder separately. Locating Key Artifacts File Name Description places.sqlite History – Bookmarks – Auto-complete – Downloads formhistory.sqlite Auto complete form data cookies.sqlite Cookies webappsstore.sqlite Web Storage extensions.json Firefox add-ons ------------------------------------------------------------------------------------------------------------- Evolution of Firefox Data Storage Over the years, Firefox has refined its data storage mechanisms. Earlier versions relied on the proprietary Mork format, which was difficult to pars e. Since Firefox 3, Mozilla has transitioned to SQLite databases, significantly improving performance and forensic accessibility. Most crucial browser artifacts are now stored in either SQLite or JSON, making them easier to analyze using tools like SQLite Browser or forensic scripts. ------------------------------------------------------------------------------------------------------------- Challenges in Firefox Forensics Frequent Updates:   Firefox follows a rapid release cycle (new versions every 4-6 weeks), which can introduce format changes that break forensic tools. Multiple User Profiles:  A single system can have multiple Firefox profiles, requiring investigators to check all profile directories. Data Encryption:   Some data, such as saved passwords (logins.json) , is encrypted and requires a decryption key stored in key4.db. Conclusion If you are conducting a forensic investigation involving Firefox, be sure to check key databases like places.sqlite, cookies.sqlite, and formhistory.sqlite for valuable insights. 🚀 --------------------------------------------Dean----------------------------------------------------

  • Investigating Chromium-Based Browsers: A Forensic Guide/Browser analysis Book

    In today's digital world, web browsers are a goldmine of information for forensic investigators. With many users relying on Chromium-based browsers like Google Chrome, Microsoft Edge, and Brave for daily activities, understanding how to analyze browser data is crucial. ------------------------------------------------------------------------------------------------------------- Understanding Browser Profiles One of the most important things to know when analyzing a Chromium-based browser is that it supports multiple user profiles . This feature allows users to keep their "work" and "personal" data separate. However, from a forensic perspective, it means there could be multiple sets of browser data that need to be examined. ------------------------------------------------------------------------------------------------------------- Where to Find Profiles? Location: %UserProfile%\AppData\Local\Google\Chrome\User Data\ The Default  folder contains the original Chrome profile. Additional profiles are stored in folders named "Profile 1," "Profile 2," etc. A Guest Profile  exists, which functions like Incognito mode and doesn't leave traces after the session ends. Microsoft Edge allows profiles without an associated email, but they are still tied to a Windows user account. ------------------------------------------------------------------------------------------------------------- Key Artifacts in the Preferences File Each profile has a Preferences file, a JSON-formatted file that records key information like: Associated email address (if provided) Profile name Installed extensions Homepage and pinned tabs Privacy and synchronization settings ------------------------------------------------------------------------------------------------------------- Recovering Deleted Browser Data When a user deletes a profile, its folder and associated databases are removed on the next reboot. However, forensic tools can often recover these files from unallocated disk space. So, even if a user tries to erase their browser history, traces may still be available for analysis . ------------------------------------------------------------------------------------------------------------- Best Tools for Chromium-Based Browser Forensics Forensic investigators have several powerful tools to extract and analyze browser artifacts. Here are some of the most effective ones: 1. Hindsight Hindsight, created by Ryan Benson, is one of the best open-source tools for parsing Chromium browser data. Parses SQLite databases used by Chrome Supports LevelDB to extract Web Storage and File System artifacts Analyzes cache files (Cache, Media Cache, GPUCache, etc.) Outputs data in Excel (XLSX) or SQLite format Supports plugins to analyze Google Analytics cookies, search history, and more How to Use Hindsight? Hindsight runs via the command line: hindsight -i "C:\Users\Username\AppData\Local\Google\Chrome\User Data" Output: This command extracts data from all profiles in the User Data folder . You can also specify individual profile folders for a more focused analysis. 2. NirSoft ChromeHistoryView NirSoft provides a lightweight, easy-to-use tool called ChromeHistoryView. Extracts browsing history from Chrome databases Displays a simple timeline of visited websites Works on newer browser versions faster than some other tools While it doesn’t provide as much detail as Hindsight, it's a good backup tool for quick investigations. ------------------------------------------------------------------------------------------------------------- Key Browser Artifacts to Investigate Chromium-based browsers store vast amounts of user data. Here are some of the most valuable artifacts: ********************************************************************************************************************* Browser Forensic Analysis Book Chapter 1: Determining Sites Visited Understanding a user's browsing activity begins with reviewing history data and associated artifacts. Key Steps: Review History Data:  Extract visited URLs, timestamps, and search keywords. Review Transition Info:  Identify typed URLs versus redirected links. Document Top Sites:  Rank frequently visited websites for behavioral insights. Audit Preferences File:  Check for visited sites, auto-fill data, and sync settings. Parse Download History:  Identify downloaded files and potential malicious payloads. Audit Bookmarks:  Retrieve saved and backup bookmarks (JSON format). Look for Other Profiles:  Detect additional Chrome user profiles to expand the scope of analysis. Relevant Files & Formats: Artifact File Location Format History Data History SQLite Bookmarks Bookmarks, Bookmarks.bak JSON Download History History SQLite Preferences Preferences file JSON Chapter 2: Filling in Evidence Gaps This phase focuses on less obvious browser artifacts that provide additional context. Key Steps: Review Cache Domains:  Extract stored website assets and determine access patterns. Analyze Specific File Types:  Identify cached executables, images, and scripts. Review Cookie Domains:  Extract stored cookies and associated metadata. Search Session Recovery Files:  Recover open tabs and recent browser activity. Analyze Web Data & Shortcuts:  Identify autocomplete and stored form data. Audit Browser Extensions:  Extract extension metadata and potential malicious add-ons. Snapshots Folder:  Examine browser snapshots for evidence of activity. Relevant Files & Formats: Artifact File Location Format Cache Data Cache N/A Cookies Cookies/IndexedDB SQLite/LevelDB Session Data Session_, Tabs_ SNSS Web Data Web Data, Network Action Predictor SQLite Chapter 3: Deep Dive Analysis Advanced forensic techniques focus on deleted, volatile, and shadowed browser data. Key Steps: Search Web Storage:  Analyze local storage data for application-based evidence. Review Sync Data Database:  Extract synchronized browsing data across multiple devices. Audit Chrome Jumplist Entries:  Recover recent browser session activities. Carve Deleted SQLite Entries:  Extract deleted history, cookies, and other records. Review Memory-Based Artifacts:  Identify browser-related artifacts in volatile memory. Focus on Incognito Artifacts:  Attempt to recover private browsing data. Targeted Analysis Using Volume Shadow Copies:  Extract historical data from system restore points. Relevant Files & Formats: Artifact File Location Format Web Storage Local Storage/IndexedDB LevelDB Sync Data Sync Data Folder LevelDB Deleted Data Recovered SQLite DBs SQLite Jumplist Entries JumpList File N/A Tools Recommended: Chrome Analysis Tools: Hindsight, Belkasoft Evidence Center SQLite Analysis: DB Browser for SQLite Memory Analysis: Volatility, Rekall Volume Shadow Copy Analysis: Shadow Explorer Staying Ahead in Browser Forensics Browser updates constantly change data storage methods, so forensic tools need to keep up. It's crucial to test tools regularly and manually verify important artifacts when needed. By understanding the storage structure, key artifacts, and best tools available, forensic analysts can effectively investigate browser activity and uncover critical evidence. -------------------------------------------Dean-----------------------------------------

  • Understanding Chrome Synchronization: A Digital Forensics Perspective

    What is Chrome Synchronization? Chrome synchronization is a feature that allows users to access their browsing data across multiple devices using their Google account. This includes bookmarks, history, passwords, and even open tabs. While this feature is highly convenient for users, it also creates a rich source of forensic artifacts that can be examined during investigations. How Chrome Sync Works When a user logs into Chrome with their Google account, synchronization is enabled by default unless they opt out during installation . This means that data from one device can be instantly available on another, even if Chrome is not actively running. To view the currently synchronized data on a running Chrome instance, users can visit chrome://sync-internals/ in their browser. ------------------------------------------------------------------------------------------------------------- Where to Look for Sync Settings? Chrome stores sync-related preferences in a JSON-based Preferences file. This file contains a "sync" section that details what is being synchronized and when it was last updated (stored in WebKit time format). However, many settings are only visible if they have been manually changed from the default. ------------------------------------------------------------------------------------------------------------- What Data Does Chrome Sync? Chrome syncs various types of user data, including: Browsing history  (only URLs typed directly in the address bar) Bookmarks Preferences Extensions Passwords (Login Data) Auto-complete data (Web Data) Open tabs from other devices A modern Chrome version (post-2019) uses a LevelDB database within the Chrome Sync Data folder to temporarily store data before syncing it to the cloud. However, this database is not meant to store large amounts of user data. ------------------------------------------------------------------------------------------------------------- What Data Does Chrome NOT Sync? Several important artifacts do not get synchronized across devices, including: Download history Cookies Keywords typed into search engines (keyword_search_terms) Omnibox suggestions (Shortcuts database) Prefetched data analytics (Network Action Predictor) Certain Chrome Preferences (e.g., media engagement, per-site zoom levels) ------------------------------------------------------------------------------------------------------------- How to Identify Synced vs. Local Data Forensic investigators can determine if a browsing entry was locally created or synced from another device by examining the visit_source table in Chrome’s history database . This table contains: Source 0 : Visits synced from other Chrome devices Source 1 : Local visits (not typically recorded for efficiency) Source 2 : Visits from Chrome extensions Source 3 : Data imported from Firefox Source 4 : Data imported from Internet Explorer Source 5 : Data imported from Safari Source 6 : Data imported from Chrome (used by Chromium Edge) Source 7 : Data imported from EdgeHTML Entries that are locally created do not appear in this table, making it easier to distinguish synced data from locally generated browsing history. ------------------------------------------------------------------------------------------------------------- Does Clearing Browsing Data Remove Synced Data? If a user clears their browsing data on one device, it does not necessarily mean the data is removed everywhere. The outcome depends on Chrome’s version and the settings chosen by the user. On the local system , most data is deleted, but some settings in the Preferences file and bookmarks remain. On synced devices , nearly all synced data is removed except for non-synced artifacts like cached files, download history, and cookies. Older Chrome versions  were not as effective at clearing synced data, leaving residual information in databases like SyncData.sqlite3. ------------------------------------------------------------------------------------------------------------- What Happens When a User Signs Out? When a user signs out of their Google account, synchronization stops for that browser instance. However, data remains on the device unless explicitly cleared . Other synced devices retain the browsing history unless the user performs a Reset Sync  from their Google Dashboard, a little-known option. Key Takeaways Chrome sync is a powerful feature that allows users to access their data across multiple devices, but it also leaves behind valuable forensic artifacts. The visit_source  table helps identify whether an entry was synced or locally created. Not all Chrome data is synced—download history, cookies, and search terms remain local. Clearing browsing data does not always erase all synchronized data across devices. Signing out of a Google account stops sync but does not delete previously synchronized data from other devices. Conclusion Understanding Chrome synchronization is essential for digital forensics. Whether investigating user behavior or tracking historical data, Chrome’s sync feature provides a valuable trail of artifacts. Investigators must be aware of what data is synced, where it is stored, and how it can be distinguished from locally generated data. ---------------------------------------------Dean---------------------------------------------------

bottom of page