Internet Artifacts

advertisement
Computer Forensics
INTERNET ARTIFACTS
BROWSERS

Leave behind:
 Caches
 Cookies
 Browser
settings (favorites, history)
 Erasing
history does not always erase the entries
created, only changes what browser displays
INTERNET EXPLORER

Index.dat
 Located
in
 c:\documents
and settings\user\local
settings\temporary internet files\
 c:\Users\user\AppDataLocal\Microsoft\Windows\Tempo
rary Internet Files\
 In
MS IE Cache File (MSIECF)
INTERNET EXPLORER

Investigate IE index.dat with
 Pasco
from foundstone
 Metz: libmsiecf project at sourceforge
 Ishigaki Win32::URLCache perl module
Keith J. Jones
Foundstone
http://www.foundstone.com/pdf/wp_index_dat.pdf
INDEX.DAT ANALYSIS
INDEX.DAT FILE HEADER
Null terminated version string.
 Followed by file size.

0x 00 80 00 00 0x 00 00 80 00 (little endian conversion)
 32768
INDEX.DAT FILE HEADER

Bytes 0x20 – 0x23: Location of hash table.
 Hash
table is used to store the actual entries.
Go to byte 0x 00 00 40 00
INDEX.DAT FILE HEADER

Beginning of hash table
INDEX.DAT FILE HEADER: HISTORY
INDEX.DAT FILE HEADER: HISTORY
Size: 0x00394000 3751936
Hash Table: 0x00005000
Directories: (null-terminated, 0x50)
INDEX.DAT FILE

Hash Table:
INDEX.DAT FILE

Hash Table:
 There
can be several hash tables. Each one
contains a pointer to the next one.

Fields in Hash Table:
 Magic
Marker “HASH”
 4B Number of Entries in Hash table.
 Multiply
 Pointer
this number by 128B
to next hash table
INDEX.DAT FILE

Hash Table:
20 entries  Total size of
hash table is 32*128B = 4KB
Next hash table at
0x 00 01 80 00
INDEX.DAT FILE HEADER
Activity flag 40 03 6C DA
Activity record pointer:
00 03 48 00
Go to 00 03 48 00
INDEX.DAT FILE HEADER
Go to that location:
INDEX.DAT FILE HEADER

Activity Record
 Type
field 4B:
 REDR
 URL
 LEAK
 Length
Field 4B:
 Multiply
 Data
with 0x80
Field
INDEX.DAT FILE HEADER

URL Activity Record
 Represents
website visited
 Record Length (4B)
 Time stamps
 8B

 8B

starting at offset +8 in the activity record:
Last Modified
starting at offset +16 in the activity record:
Last accessed
 Organized
like file MAC times.
INDEX.DAT FILE HEADER

REDR Activity Record
 Subject’s
browser redirected to another site
 Same Type, length, data format
 Followed by URL at offset 16 in activity record
INDEX.DAT FILE HEADER

LEAK activity record
 Same
as URL
INDEX.DAT FILE HEADER

Deleted Records:
 Will
not show up when consulting IE history.
 But often still there.
 “Delete history” is not rewriting the history file.
Computer Forensics, 2013
INTERNET EXPLORER ARTIFACTS
(CONTINUED)
INDEX.DAT ARTIFACTS
IE artifacts created by the WinInet API
 Often, malware uses same API

 If
at administrator level:
 Entries
in index.dat for “Default User” or “LocalService”
account
IE FAVORITES

Located in
 %USERPROFILE%\Favorites

Is a file with MAC times
COOKIES

Cookie files generated in
 Documents
and Settings\%username%\cookies
 Users\%username%\AppData\Roaming\Microsoft\
Windows\Cookies
Can be inspected directly or by using galleta
 Time stamps:

 Can
be from issuing site
 More likely, created by java-script (giving local time)
CACHES

Stored in system-type specific directories
Computer Forensics 2013
FIREFOX
FIREFOX

Stores data in SQLite 3 databases

Open tools to access them
Firefox stores in a user-specific profile directory
 Folder contains profiles.ini

Profiles.ini contains various folders
 Important:

 Formhistory.sqlite
 Downloads.sqlite
 Cookies.sqlite
 Places.sqlite
FIREFOX

Cache
 Cache
directory contains numbered files in binary
format
 NirSoft, Woanware
FIREFOX

sessionstore.js
 If
firefox is not terminated properly
 Used to restore browsing session
 Content: JSON objects (use JSON viewer)
Computer Forensics 2013
CHROME
CHROME
Uses system-type dependent directory location
 Uses SQLite

Cookies
 History: tables downloads, urls, visits

 Time
values stored in seconds since Jan 1, 1601 UTC
Login Data
 Web Data (autofill)
 Thumbnails (of websites visited)


Chrome bookmarks

File with JSON objects
CHROME

Cache
 index
file
 four number files data_0, .., data_3
 f_(six hex digits) files
 Creation
time of f_files can be correlated with data from
history data base
 No open source tools
Computer Forensics, 2013
SAFARI
SAFARI

History in History.plist
 times
stored as MacAbsoluteTime
 (Seconds
since January 1, 2001 GMT)
 Use Safari Forensics Tools (SFT) for scanning
Downloads.plist
 Bookmarks.plist
 Cookies.plist

SAFARI

Cache information in Cache.db SQLite3
database
 cfurl_cache_response
(URL)
 cfurl_cache_blob_data (actual cached data)

LastSession.plist
Computer Forensics 2013
OUTLOOK ARTIFACTS
OUTLOOK

Storage format is PST
 OST

for offline storage of email
PST format information at
msdn.microsoft.com/enus/library/ff385210.aspx
Download