Examining the Behavior of Web Browsers Using Popular Forensic Tools

Examining the Behavior of Web Browsers Using Popular Forensic Tools

Areej Muqbil Alotibi, Salem Yahya Altaleedi, Tanveer Zia, Emad Ul Haq Qazi
Copyright: © 2024 |Pages: 22
DOI: 10.4018/IJDCF.349218
Article PDF Download
Open access articles are freely available for download

Abstract

Mobile phones and computers are widely used devices these days, with almost everyone carrying a smartphone and multiple personal computing devices at their homes. Unfortunately, the perpetrator exploits these devices for their unlawful activities. They employ various tactics such as sending phishing emails, and malicious links to harvest confidential information and exploit users. The perpetrators often leave traces on search engines, where they search for illegal materials and weapons, or send threatening emails to victims. This paper primarily focuses on locating and retrieving browsers' artifacts while considering the challenges posed by private browsing modes, which perpetrator may use to cover their tracks. The study also compares well-known search engines like Edge, Safari, and Firefox, analyzing the strengths and weaknesses of their directories. Moreover, it explores evidence extraction from smartphones, comparing the success rates between rooted or jailbroken phones and evidence obtained from browsers versus applications.
Article Preview
Top

Methodology

The methodology employed in this research is meticulously designed to systematically evaluate the forensic capabilities of selected web browsers. This involves the use of standard forensic tools to analyze browser artifacts under controlled conditions. The selection of browsers and tools is based on their prevalence in the industry and relevance to forensic investigations, ensuring that the findings are applicable to real-world scenarios.

Selection of Web Browsers

In this study, we selected three popular web browsers: Mozilla Firefox [1], Safari, and Microsoft Edge. These browsers were chosen due to their significant market share and frequent usage across various platforms. Google Chrome has already been thoroughly examined in normal and incognito modes [19]. Figure 1 shows the statistics about the browsers.

Figure 1.

Browser statistics

IJDCF.349218.f01

According to Firefox statistics for 2022, the browser has approximately 362 million users worldwide. Apple's Safari [2] is regarded as the safest browser, with only 26 vulnerabilities discovered in 2022. Microsoft Edge is Microsoft's recommended web browser and the default web browser for Windows; Windows supports web-platform-based applications.

Forensic Tools

To analyze the behavior of web browsers, we utilized industry-standard forensic tools, including Autopsy, AXIOM, and XRY. These tools enable the extraction and analysis of browser artifacts, allowing for a comprehensive investigation. We employed Autopsy for in-depth examination of computer images, supporting functionalities like keyword search, hash matching, and registry analysis. AXIOM was utilized for its superior capabilities in uncovering challenging digital evidence and integrating data from different sources into a single case file. Additionally, XRY was chosen for its effectiveness in extracting a large volume of data from mobile devices while maintaining the integrity of the evidence. These tools were pivotal in allowing us to capture and analyze crucial browser artifacts from both computers and mobile devices.

Autopsy [3] is a free, open-source desktop digital forensics tool for Windows that includes all of the capabilities found in commercial digital forensics products. It is extendable and includes capabilities such as keyword search, hash matching, registry analysis, web analytics, and others. AXIOM [4] is used by digital forensics professionals to search for evidence that other tools cannot locate, to validate data, and to analysis images gathered with other tools into a single case file for review. AXIOM goes beyond Magnet IEF's excellent search and carving capabilities. XRY [5] is a strong, user-friendly, and efficient mobile data recovery program for the Windows operating system. It is capable of securely and efficiently extracting large volume of data, while always retaining the evidence's integrity. Table 1 shows the lab configuration.

Table 1.
Lab configuration
SoftwareVersionDescription
VMware Workstation
17
To provide virtual environment for the experiment
Windows 10
10 64-bit
The operating system used on the computer
Firefox Browser
109.0
The browser under testing
Microsoft Edge Browser
113.0
The browser under testing
FTK Imager
4.7
To capture a forensic image of computer system
Autopsy Forensics
4.20
To analyze the computer images
DB Browser (SQLite)

To read the SQ databases files
DCode
5
To convert the time zones
Notepad

To read the extracted text files
JSON reader

To read JSON files
Windows 10
10 64-bit
The operating system used to install the tools
Magnet AXIOM Examine
6
To analysis the images
XAMN
6.2.0
To analysis the images
XRY
9.6.0
To image the device
Magnet AXIOM process
6.10.0
To image the device
Magnet ACQUIRE
2.26.0
To image the device
Checkra1n
Beta 0.12.4
To jailbreak the iPhone
Cable USP iPhone

To connect the iPhone to computer
Cable type C USP SamsungTo connect the Nokia to computer

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing