Difference between pages "Tools" and "Google Chrome"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
(Open Source)
 
Line 1: Line 1:
This is an '''overview of available tools''' for forensic [[investigator]]s. Please click on the name of any tool for more details.
+
Google Chrome is a [[Web Browser|web browser]] developed by Google Inc.
  
'''Note: This page has gotten too big and is being broken up. See:'''
+
== Configuration ==
 +
The Google Chrome configuration can be found in the '''Preferences''' file.
  
* [[:Category:Disk Imaging]]
+
On Linux
* [[Tools:Data Recovery]] (including file [[carving]])
+
<pre>
* [[Tools:File Analysis]]
+
/home/$USER/.config/google-chrome/Default/Preferences
* [[Tools:Document Metadata Extraction]]
+
</pre>
* [[Tools:Memory Imaging]]
+
* [[Tools:Memory Analysis]]
+
* [[Tools:Network Forensics]]
+
* [[Tools:Logfile Analysis]]
+
* [[:Category:Anti-forensics tools]]
+
* [[:Category:Secure deletion]]
+
  
= Disk Analysis Tools =
+
On MacOS-X
== Hard Drive Firmware and Diagnostics Tools ==
+
<pre>
; [[PC-3000]] from [[DeepSpar Data Recovery Systems]]
+
/Users/$USER/Library/Application Support/Google/Chrome/Default/Preferences
: http://www.deepspar.com/products-pc-3000-drive.html
+
</pre>
: http://www.pc-3000.com/
+
  
== Linux-based Tools ==
+
On Windows XP
; [[LINReS]] by [[NII Consulting Pvt. Ltd.]]
+
<pre>
: http://www.niiconsulting.com/innovation/linres.html
+
C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Google\Chrome\User Data\Default\Preferences
 +
</pre>
  
; [[SMART]] by [[ASR Data]]
+
On Windows Vista and later
: http://www.asrdata.com
+
<pre>
 +
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\Preferences
 +
</pre>
  
; [[Second Look: Linux Memory Forensics]] by [[Pikewerks Corporation]]
+
Or for '''Chrome SxS''' (Chrome side-by-side)
: http://secondlookforensics.com/
+
  
== Macintosh-based Tools ==
+
<pre>
 +
C:\Users\%USERNAME%\AppData\Local\Google\Chrome SxS\User Data\Default\Preferences
 +
</pre>
  
; [[Macintosh Forensic Software]] by [[BlackBag Technologies, Inc.]]
+
Or for '''Chromium'''
: http://www.blackbagtech.com/software_mfs.html
+
  
; [[MacForensicsLab]] by [[Subrosasoft]]
+
On Linux
: [http://www.subrosasoft.com/OSXSoftware/index.php?main_page=product_info&cPath=39&products_id=114 MacForensicLab-Subrosasoft]
+
<pre>
 +
/home/$USER/.config/chromium/Default/Preferences
 +
</pre>
  
; [[Mac Marshal]] by [[ATC-NY]]
+
On MacOS-X
: http://www.macmarshal.com/
+
<pre>
 +
/Users/$USER/Library/Application Support/Chromium/Default/Preferences
 +
</pre>
  
== Windows-based Tools ==
+
On Windows XP
 +
<pre>
 +
C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Chromium\User Data\Default\Preferences
 +
</pre>
  
; [[Blackthorn GPS Forensics]]
+
On Windows Vista and later
: http://www.blackthorngps.com
+
<pre>
 +
C:\Users\%USERNAME%\AppData\Local\Chromium\User Data\Default\Preferences
 +
</pre>
  
; [[BringBack]] by [[Tech Assist, Inc.]]
+
=== Plugins ===
: http://www.toolsthatwork.com/bringback.htm
+
  
; Belkasoft Evidence Center by [[Belkasoft]]
+
Information about plugins can be found under the "plugins section" of the Preferences file.
; http://www.belkasoft.com
+
: This product makes it easy for an investigator to search, analyze and store digital evidence found in Instant Messenger histories, Internet Browser histories and Outlook mailboxes.  
+
  
; [[CD/DVD Inspector]] by [[InfinaDyne]]
+
=== DNS Prefetching ===
; http://www.infinadyne.com/cddvd_inspector.html
+
: This is the only forensic-qualified tool for examinination of optical media.  It has been around since 1999 and is in use by law enforcement, government and data recovery companies worldwide.
+
  
; [[EMail Detective - Forensic Software Tool]] by [[Hot Pepper Technology, Inc]]
+
DNS is prefetched for related sites, e.g. links on the page.
; http://www.hotpepperinc.com/emd
+
This behavior is controlled by the setting "Predict network actions to improve page load performance", which is enabled by default.
  
; [[EnCase]] by [[Guidance Software]]
+
If enabled the Preferences file contains:
: http://www.guidancesoftware.com/
+
<pre>
 +
  "dns_prefetching": {
 +
      "enabled": true,
 +
</pre>
  
; Facebook Forensic Toolkit (FFT) by [[Afentis_forensics]]
+
If disabled the Preferences file contains:
; http://www.facebookforensics.com
+
<pre>
: eDiscovery toolkit to identify and clone full profiles; including wall posts, private messages, uploaded photos/tags, group details, graphically illustrate friend links, and generate expert reports.
+
  "dns_prefetching": {
 +
      "enabled": false,
 +
</pre>
  
; [[Forensic Toolkit]] ([[FTK]]) by [[AccessData]]
+
== Start-up DNS queries ==
: http://www.accessdata.com/products/ftk/
+
  
; [[HBGary Responder Professional]]  - Windows Physical Memory Forensic Platform
+
When Chrome starts it queries for several non-existing hostnames that consists of a 10 random characters, E.g.
:http://www.hbgary.com
+
<pre>
 +
ttrgoiknff.mydomain.com
 +
bxjhgftsyu.mydomain.com
 +
yokjbjiagd.mydomain.com
 +
</pre>
  
; [[ILook Investigator]] by [[Elliot Spencer]] and [[Internal Revenue Service|U.S. Dept of Treasury, Internal Revenue Service - Criminal Investigation]] (IRS)
+
This is used to determine if your ISP is hijacking NXDOMAIN results [http://www.google.com/support/forum/p/Chrome/thread?tid=3511015c72a7b314&hl=en].
: http://www.ilook-forensics.org/
+
  
; [[Mercury Indexer]] by [[MicroForensics, Inc.]]
+
== Disk Cache ==
: http://www.MicroForensics.com/
+
Google Chrome uses multiple caches, from [http://src.chromium.org/viewvc/chrome/trunk/src/net/base/cache_type.h?view=markup]:
 +
<pre>
 +
// The types of caches that can be created.
 +
enum CacheType {
 +
    DISK_CACHE, // Disk is used as the backing storage.
 +
    MEMORY_CACHE,  // Data is stored only in memory.
 +
    MEDIA_CACHE,  // Optimized to handle media files.
 +
    APP_CACHE,  // Backing store for an AppCache.
 +
    SHADER_CACHE, // Backing store for the GL shader cache.
 +
    PNACL_CACHE, // Backing store the PNaCl translation cache
 +
};
 +
</pre>
  
; [[Nuix Desktop]] by [[Nuix Pty Ltd]]
+
<b>Note that $PROFILE (or %PROFILE%) the paths below is the profile dependent subdirectory which is normally Default but also could be Profile1, Profile2, etc.</b>
: http://www.nuix.com
+
  
; [[OnLineDFS]] by [[Cyber Security Technologies]]
+
The Google Chrome disk cache uses the [[Chrome Disk Cache Format]] and can be found in:
: http://www.cyberstc.com/
+
  
; [[OSForensics]] by [[PassMark Software Pty Ltd]]
+
On Linux
: http://www.osforensics.com/
+
  
; [[P2 Power Pack]] by [[Paraben]]
+
<pre>
: https://www.paraben-forensics.com/catalog/product_info.php?cPath=25&products_id=187
+
/home/$USER/.cache/chromium/$PROFILE/Cache/
 +
/home/$USER/.cache/google-chrome/$PROFILE/Cache/
 +
/home/$USER/.config/chromium/$PROFILE/Cache/
 +
/home/$USER/.config/google-chrome/$PROFILE/Cache/
 +
</pre>
  
; [[Prodiscover]] by [[Techpathways]]
+
<pre>
: http://www.techpathways.com/ProDiscoverWindows.htm
+
/home/$USER/.cache/chromium/$PROFILE/Media Cache/
 +
/home/$USER/.cache/google-chrome/$PROFILE/Media Cache/
 +
/home/$USER/.config/chromium/$PROFILE/Media Cache/
 +
/home/$USER/.config/google-chrome/$PROFILE/Media Cache/
 +
</pre>
  
; [[Proof Finder]] by [[Nuix Pty Ltd]]
+
<pre>
: http://www.prooffinder.com/
+
/home/$USER/.config/chromium/$PROFILE/Application Cache/Cache/
 +
/home/$USER/.config/google-chrome/$PROFILE/Application Cache/Cache/
 +
</pre>
  
; [[Safeback]] by [[NTI]] and [[Armor Forensics]]
+
<pre>
: http://www.forensics-intl.com/safeback.html
+
/home/$USER/.config/chromium/$PROFILE/GPUCache/
 +
/home/$USER/.config/google-chrome/$PROFILE/GPUCache/
 +
</pre>
  
; [[X-Ways Forensics]] by [[X-Ways AG]]
+
<pre>
: http://www.x-ways.net/forensics/index-m.html
+
/home/$USER/.cache/chromium/PnaclTranslationCache/
 +
/home/$USER/.cache/google-chrome/PnaclTranslationCache/
 +
</pre>
  
; [[DateDecoder]] by [[Live-Forensics]]
+
On MacOS-X
: http://www.live-forensics.com/dl/DateDecoder.zip
+
<pre>
: A command line tool that decodes most encoded time/date stamps found on a windows system, and outputs the time/date in a human readable format.
+
/Users/$USER/Library/Caches/Chromium/$PROFILE/Cache
 +
/Users/$USER/Library/Caches/Google/Chrome/$PROFILE/Cache
 +
</pre>
  
; [[RecycleReader]] by [[Live-Forensics]]
+
<b>TODO confirm the following paths</b>
: http://www.live-forensics.com/dl/RecycleReader.zip
+
<pre>
: A command line tool that outputs the contents of the recycle bin on XP, Vista and 7.
+
/Users/$USER/Caches/Chromium/$PROFILE/Cache/
 +
/Users/$USER/Caches/Google/Chrome/$PROFILE/Cache/
 +
</pre>
  
; [[Dstrings]] by [[Live-Forensics]]
+
<pre>
: http://www.live-forensics.com/dl/Dstrings.zip
+
/Users/$USER/Library/Caches/Chromium/$PROFILE/Media Cache
: A command line tool that searches for strings in a given file.  It has the ability to compare the output of those strings against a dictionary to either exclude the dictionary terms in the output or only output files that match the dictionary.  It also has the ability to search for IP Addresses and URLs/Email Addresses.
+
/Users/$USER/Library/Caches/Google/Chrome/$PROFILE/Media Cache
 +
</pre>
  
; [[Unique]] by [[Live-Forensics]]
+
<pre>
: http://www.live-forensics.com/dl/Unique.zip
+
/Users/$USER/Library/Application Support/Chromium/$PROFILE/Application Cache/Cache/
: A command line tool similar to the Unix uniq. Allows for unique string counts, as well as various sorting options.
+
/Users/$USER/Library/Application Support/Google/Chrome/$PROFILE/Application Cache/Cache/
 +
</pre>
  
; [[HashUtil]] by [[Live-Forensics]]
+
<pre>
: http://www.live-forensics.com/dl/HashUtil.zip
+
/Users/$USER/Library/Application Support/Chromium/$PROFILE/GPUCache/
: HashUtil.exe will calculate MD5, SHA1, SHA256 and SHA512 hashes.  It has an option that will attempt to match the hash against the NIST/ISC MD5 hash databases.
+
/Users/$USER/Library/Application Support/Google/Chrome/$PROFILE/GPUCache/
 +
</pre>
  
; [http://www.windowsscope.com WindowsSCOPE Pro, Ultimate, Live]
+
<pre>
: Comprehensive Windows Memory Forensics and Cyber Analysis, Incident Response, and Education support.
+
/Users/$USER/Library/Caches/Chromium/PnaclTranslationCache/
: Software and hardware based acquisition with [http://www.windowsscope.com/index.php?option=com_virtuemart&Itemid=34 CaptureGUARD PCIe and ExpressCard]
+
/Users/$USER/Library/Caches/Google/Chrome/PnaclTranslationCache/
: Hardware based acquisition of memory on a locked computer via [http://www.windowsscope.com/index.php?page=shop.product_details&flypage=flypage.tpl&product_id=30&category_id=1&option=com_virtuemart&Itemid=34 CaptureGUARD Gateway]
+
</pre>
: [http://www.windowsscope.com  WindowsSCOPE] Live provides memory analysis of Windows computers on a network from Android phones and tablets.
+
  
== Open Source Tools ==
+
On Windows XP
  
; [[AFFLIB]]
+
<b>TODO confirm the following paths</b>
: A library for working with [[disk image]]s. Currently AFFLIB supports raw, [[AFF]], [[AFD]], and [[EnCase]] file formats. Work to support segmented raw, [[iLook]], and other formats is ongoing.
+
<pre>
 +
C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Chromium\User Data\Cache\
 +
C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Google\Chrome\User Data\Cache\
 +
</pre>
  
; [[Autopsy]]
+
On Windows Vista and later
: http://www.sleuthkit.org/autopsy/desc.php
+
<pre>
 +
C:\Users\%USERNAME%\AppData\Local\Google\Chromium\%PROFILE%\Cache\
 +
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\%PROFILE%\Cache\
 +
</pre>
  
; [[Bulk Extractor]]
+
<pre>
: https://github.com/simsong/bulk_extractor/wiki
+
C:\Users\%USERNAME%\AppData\Local\Google\Chromium\%PROFILE%\Application Cache\Cache\
: Bulk Extractor provides digital media triage by extracting Features from digital media.
+
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\%PROFILE%\Application Cache\Cache\
 +
</pre>
  
; [[Bulk Extractor Viewer]]
+
<pre>
: https://github.com/simsong/bulk_extractor/wiki/BEViewer
+
C:\Users\%USERNAME%\AppData\Local\Google\Chromium\%PROFILE%\Media Cache\
: Bulk Extractor Viewer is a browser UI for viewing Feature data extracted using [[Bulk Extractor]].
+
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\%PROFILE%\Media Cache\
 +
</pre>
  
; [[Digital Forensics Framework]] (DFF)
+
<pre>
: DFF is cross-platform and open-source, user and developers oriented. It provide many features and is very modular. Our goal is to provide a powerful framework to the forensic community, so people can use only one tool during the analysis. http://www.digital-forensic.org
+
C:\Users\%USERNAME%\AppData\Local\Google\Chromium\%PROFILE%\GPUCache\
 +
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\%PROFILE%\GPUCache\
 +
</pre>
  
; [[foremost]]
+
The Chrome Cache contains different files with the following file names:
: http://foremost.sf.net/
+
* index
: [[Linux]] based file carving program
+
* data_#; where # contains a decimal digit.
 +
* f_######; where # contains a hexadecimal digit.
  
; [[FTimes]]
+
== History ==
: http://ftimes.sourceforge.net/FTimes/index.shtml
+
Chrome stores the history of visited sites in a file named '''History'''. This file uses the [[SQLite database format]].
: FTimes is a system baselining and evidence collection tool.
+
  
; [[gfzip]]
+
The '''History''' file can be found in same location as the '''Preferences''' file.
: http://www.nongnu.org/gfzip/
+
  
; [[gpart]]
+
There is also '''Archived History''' that predates information in the '''History''' file.
: http://www.stud.uni-hannover.de/user/76201/gpart/
+
Note that the '''Archived History''' only contains visits.
: Tries to ''guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted''.
+
  
; [[Hachoir]]
+
=== Timestamps ===
: A generic framework for binary file manipulation, it supports [[FAT12]], [[FAT16]], [[FAT32]], [[ext2|ext2/ext3]], Linux swap, MSDOS partition header, etc. Recognize file type. Able to find subfiles (hachoir-subfile).
+
The '''History''' file uses the different timestamps.
  
; [[magicrescue]]
+
==== visits.visit_time ====
: http://jbj.rapanden.dk/magicrescue/
+
  
; The [[Open Computer Forensics Architecture]]
+
The '''visits.visit_time''' is in (the number of) microseconds since January 1, 1601 UTC
: http://ocfa.sourceforge.net/
+
  
; [[pyflag]]
+
Some Python code to do the conversion into human readable format:
: http://code.google.com/p/pyflag/
+
<pre>
: Web-based, database-backed forensic and log analysis GUI written in Python.
+
date_string = datetime.datetime( 1601, 1, 1 )
 +
            + datetime.timedelta( microseconds=timestamp )
 +
</pre>
  
; [[Scalpel]]
+
Note that this timestamp is not the same as a Windows filetime which is (the number of) 100 nanoseconds since January 1, 1601 UTC
: http://www.digitalforensicssolutions.com/Scalpel/
+
: [[Linux]] and [[Windows]] file carving program originally based on [[foremost]].
+
  
; [[scrounge-ntfs]]
+
==== downloads.start_time ====
: http://memberwebs.com/nielsen/software/scrounge/
+
  
; [[Sleuthkit]]
+
The '''downloads.start_time''' is in (the number of) seconds since January 1, 1970 UTC
: http://www.sleuthkit.org/
+
  
; [[The Coroner's Toolkit]] ([[TCT]])
+
Some Python code to do the conversion into human readable format:
: http://www.porcupine.org/forensics/tct.html
+
<pre>
 +
date_string = datetime.datetime( 1970, 1, 1 )
 +
            + datetime.timedelta( seconds=timestamp )
 +
</pre>
  
== [[NDA]] and [[scoped distribution]] tools ==
+
=== Example queries ===
 +
Some example queries:
  
= Enterprise Tools (Proactive Forensics)=
+
To get an overview of the visited sites:
 +
<pre>
 +
SELECT datetime(((visits.visit_time/1000000)-11644473600), "unixepoch"), urls.url, urls.title FROM urls, visits WHERE urls.id = visits.url;
 +
</pre>
  
; [[LiveWire Investigator 2008]] by [[WetStone Technologies]]
+
Note that the visit_time conversion looses precision.
: http://www.wetstonetech.com/f/livewire2008.html
+
  
; [[P2 Enterprise Edition]] by [[Paraben]]
+
To get an overview of the downloaded files:
: http://www.paraben-forensics.com/enterprise_forensics.html
+
<pre>
 +
SELECT datetime(downloads.start_time, "unixepoch"), downloads.url, downloads.full_path, downloads.received_bytes, downloads.total_bytes FROM downloads;
 +
</pre>
  
= Forensics Live CDs =
+
How the information of the downloaded files is stored in the database can vary per version of Chrome as of version 26:
; [[Kali Linux]]
+
<pre>
: [http://www.kali.org/ http://www.kali.org/]
+
SELECT datetime(((downloads.start_time/1000000)-11644473600), "unixepoch"), downloads.target_path, downloads_url_chains.url, downloads.received_bytes, downloads.total_bytes \
 +
FROM downloads, downloads_url_chains WHERE downloads.id = downloads_url_chains.id;
 +
</pre>
  
; [[KNOPPIX]]  
+
== Cookies ==
: [http://www.knopper.net/knoppix/index-en.html http://www.knopper.net/knoppix/index-en.html]
+
Chrome stores the cookies in a file named '''Cookies'''. This file uses the [[SQLite database format]].
  
; [[BackTrack Linux]]  
+
=== Extension Cookies ===
: [http://www.backtrack-linux.org/ http://www.backtrack-linux.org/]
+
Chrome stores the cookies used by extensions in a file named '''Extension Cookies'''. This file uses the [[SQLite database format]].
  
See: [[:Category:Live CD|Forensics Live CDs]]
+
<pre>
 +
SELECT datetime(((cookies.creation_utc/1000000)-11644473600), "unixepoch"), cookies.host_key, cookies.name, cookies.value, cookies.path, \
 +
datetime(((cookies.expires_utc/1000000)-11644473600), "unixepoch"), cookies.secure, cookies.httponly, datetime(((cookies.last_access_utc/1000000)-11644473600), "unixepoch"), \
 +
cookies.has_expires, cookies.persistent, cookies.priority FROM cookies;
 +
</pre>
  
= Personal Digital Device Tools=
+
== See Also ==
 +
* [[Chrome Disk Cache Format]]
 +
* [[SQLite database format]]
  
== GPS Forensics ==
+
== External Links ==
 +
* [http://en.wikipedia.org/wiki/Google_Chrome Wikipedia article on Google Chrome]
 +
* [http://www.chromium.org/user-experience/user-data-directory The Chromium Projects - User Data Directory]
 +
* [http://www.chromium.org/developers/design-documents/network-stack/disk-cache Chrome Disk Cache]
 +
* [http://www.google.com/support/forum/p/Chrome/thread?tid=3511015c72a7b314&hl=en Chrome support forum article random 10 character hostnames on startup]
 +
* [http://www.useragentstring.com/pages/Chrome/ Chrome User Agent strings]
 +
* [http://computer-forensics.sans.org/blog/2010/01/21/google-chrome-forensics/ Google Chrome Forensics] by [[Kristinn Guðjónsson]], January 21, 2010
 +
* [http://linuxsleuthing.blogspot.ch/2013/02/cashing-in-on-google-chrome-cache.html?m=1 Cashing in on the Google Chrome Cache], [[John Lehr]], February 24, 2013
 +
* [http://www.obsidianforensics.com/blog/history-index-files-removed-from-chrome/ History Index files removed from Chrome v30], by Ryan Benson, October 2, 2013
 +
* [https://hindsight-internet-history.googlecode.com/files/Evolution_of_Chrome_Databases.png Evolution of Chrome Databases], by Ryan Benson, November 12, 2013
  
; [[Blackthorn GPS Forensics]]
+
== Tools ==
; [[.XRY]]
+
=== Open Source ===
 +
* [https://code.google.com/p/hindsight-internet-history/ hindsight-internet-history]
 +
* [[plaso]]
  
== PDA Forensics ==
+
[[Category:Applications]]
; [[Cellebrite UFED]]
+
[[Category:Web Browsers]]
; [[.XRY]]
+
; [[Paraben PDA Seizure]]
+
; [[Paraben PDA Seizure Toolbox]]
+
; [[PDD]]
+
 
+
== Cell Phone Forensics ==
+
; [[BitPIM]]
+
; [[Cellebrite UFED]]
+
; [[DataPilot Secure View]]
+
; [[.XRY]]
+
: http://www.msab.com/index
+
; [[Fernico ZRT]]
+
; [[ForensicMobile]]
+
; [[LogiCube CellDEK]]
+
; [[MOBILedit!]]
+
; [[Oxygen Forensic Suite 2010]]
+
: http://www.oxygen-forensic.com
+
; [[Paraben's Device Seizure]] and [[Paraben's Device Seizure Toolbox]]
+
: http://www.paraben-forensics.com/handheld_forensics.html
+
; [[Serial Port Monitoring]]
+
; [[TULP2G]]
+
 
+
== SIM Card Forensics ==
+
; [[Cellebrite UFED]]
+
; [[.XRY]]
+
; [[ForensicSIM]]
+
; [[Paraben's SIM Card Seizure]]
+
: http://www.paraben-forensics.com/handheld_forensics.html
+
; [[SIMCon]]
+
 
+
== Preservation Tools ==
+
; [[Paraben StrongHold Bag]]
+
; [[Paraben StrongHold Tent]]
+
 
+
= Other Tools =
+
; Chat Sniper
+
: http://www.alexbarnett.com/chatsniper.htm
+
:  A forensic software tool designed to simplify the process of on-scene evidence acquisition and analysis of logs and data left by the use of AOL, MSN (Live), or Yahoo instant messenger.
+
 
+
; Computer Forensics Toolkit
+
: http://computer-forensics.privacyresources.org
+
: This is a collection of resources, most of which are informational, designed specifically to guide the beginner, often in a procedural sense.
+
 
+
; Live View
+
: http://liveview.sourceforge.net/
+
: Live View is a graphical forensics tool that creates a [[VMware]] [[virtual machine]] out of a dd disk image or physical disk.
+
 
+
; Parallels VM
+
: http://www.parallels.com/
+
: http://en.wikipedia.org/wiki/Parallels_Workstation
+
 
+
; Microsoft Virtual PC
+
: http://www.microsoft.com/windows/products/winfamily/virtualpc/default.mspx
+
: http://en.wikipedia.org/wiki/Virtual_PC
+
 
+
; [[VMware]] Player
+
: http://www.vmware.com/products/player/
+
: http://en.wikipedia.org/wiki/VMware#VMware_Workstation
+
: A free player for [[VMware]] [[virtual machine]]s that will allow them to "play" on either [[Windows]] or [[Linux]]-based systems.
+
 
+
; [[VMware]] Server
+
: http://www.vmware.com/products/server/
+
: The free server product, for setting up/configuring/running [[VMware]] [[virtual machine]].Important difference being that it can run 'headless', i.e. everything in background.
+
 
+
; Webtracer
+
: http://www.forensictracer.com
+
: Software for forensic analysis of internet resources (IP address, e-mail address, domain name, URL, e-mail headers, log files...)
+
 
+
== Hex Editors ==
+
 
+
; [[biew]]
+
: http://biew.sourceforge.net/en/biew.html
+
 
+
; [[Okteta]]
+
: KDE's new cross-platform hex editor with features such as signature-matching
+
: http://utils.kde.org/projects/okteta/
+
 
+
; [[hexdump]]
+
: ...
+
 
+
; [[HexFiend]]
+
: A hex editor for Apple OS X
+
: http://ridiculousfish.com/hexfiend/
+
 
+
; [[Hex Workshop]]
+
: A hex editor from [[BreakPoint Software, Inc.]]
+
: http://www.bpsoft.com
+
 
+
; [[khexedit]]
+
: http://docs.kde.org/stable/en/kdeutils/khexedit/index.html
+
 
+
; [[WinHex]]
+
: Computer forensics software, data recovery software, hex editor, and disk editor from [[X-Ways]].
+
: http://www.x-ways.net/winhex
+
 
+
; [[wxHexEditor]]
+
: A Multi-OS supported, open sourced, hex and disk editor.
+
: http://www.wxhexeditor.org
+
 
+
; [[xxd]]
+
: ...
+
 
+
; [[HexReader]]
+
: [[Live-Forensics]] software that reads windows files at specified offset and length and outputs results to the console.
+
: http://www.live-forensics.com/dl/HexReader.zip
+
 
+
= Telephone Scanners/War Dialers =
+
 
+
;PhoneSweep
+
:http://www.sandstorm.net/products/phonesweep/
+
:PhoneSweep is a commercial grade multi-line wardialer used by many security auditors to run telephone line scans in their organizations. PhoneSweep Gold is the distributed-access add-on for PhoneSweep, for organizations that need to run scans remotely.
+

Revision as of 03:45, 22 June 2014

Google Chrome is a web browser developed by Google Inc.

Configuration

The Google Chrome configuration can be found in the Preferences file.

On Linux

/home/$USER/.config/google-chrome/Default/Preferences

On MacOS-X

/Users/$USER/Library/Application Support/Google/Chrome/Default/Preferences

On Windows XP

C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Google\Chrome\User Data\Default\Preferences

On Windows Vista and later

C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\Preferences

Or for Chrome SxS (Chrome side-by-side)

C:\Users\%USERNAME%\AppData\Local\Google\Chrome SxS\User Data\Default\Preferences

Or for Chromium

On Linux

/home/$USER/.config/chromium/Default/Preferences

On MacOS-X

/Users/$USER/Library/Application Support/Chromium/Default/Preferences

On Windows XP

C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Chromium\User Data\Default\Preferences

On Windows Vista and later

C:\Users\%USERNAME%\AppData\Local\Chromium\User Data\Default\Preferences

Plugins

Information about plugins can be found under the "plugins section" of the Preferences file.

DNS Prefetching

DNS is prefetched for related sites, e.g. links on the page. This behavior is controlled by the setting "Predict network actions to improve page load performance", which is enabled by default.

If enabled the Preferences file contains:

   "dns_prefetching": {
      "enabled": true,

If disabled the Preferences file contains:

   "dns_prefetching": {
      "enabled": false,

Start-up DNS queries

When Chrome starts it queries for several non-existing hostnames that consists of a 10 random characters, E.g.

ttrgoiknff.mydomain.com
bxjhgftsyu.mydomain.com
yokjbjiagd.mydomain.com

This is used to determine if your ISP is hijacking NXDOMAIN results [1].

Disk Cache

Google Chrome uses multiple caches, from [2]:

// The types of caches that can be created.
enum CacheType {
    DISK_CACHE,  // Disk is used as the backing storage.
    MEMORY_CACHE,  // Data is stored only in memory.
    MEDIA_CACHE,  // Optimized to handle media files.
    APP_CACHE,  // Backing store for an AppCache.
    SHADER_CACHE, // Backing store for the GL shader cache.
    PNACL_CACHE, // Backing store the PNaCl translation cache
};

Note that $PROFILE (or %PROFILE%) the paths below is the profile dependent subdirectory which is normally Default but also could be Profile1, Profile2, etc.

The Google Chrome disk cache uses the Chrome Disk Cache Format and can be found in:

On Linux

/home/$USER/.cache/chromium/$PROFILE/Cache/
/home/$USER/.cache/google-chrome/$PROFILE/Cache/
/home/$USER/.config/chromium/$PROFILE/Cache/
/home/$USER/.config/google-chrome/$PROFILE/Cache/
/home/$USER/.cache/chromium/$PROFILE/Media Cache/
/home/$USER/.cache/google-chrome/$PROFILE/Media Cache/
/home/$USER/.config/chromium/$PROFILE/Media Cache/
/home/$USER/.config/google-chrome/$PROFILE/Media Cache/
/home/$USER/.config/chromium/$PROFILE/Application Cache/Cache/
/home/$USER/.config/google-chrome/$PROFILE/Application Cache/Cache/
/home/$USER/.config/chromium/$PROFILE/GPUCache/
/home/$USER/.config/google-chrome/$PROFILE/GPUCache/
/home/$USER/.cache/chromium/PnaclTranslationCache/
/home/$USER/.cache/google-chrome/PnaclTranslationCache/

On MacOS-X

/Users/$USER/Library/Caches/Chromium/$PROFILE/Cache
/Users/$USER/Library/Caches/Google/Chrome/$PROFILE/Cache

TODO confirm the following paths

/Users/$USER/Caches/Chromium/$PROFILE/Cache/
/Users/$USER/Caches/Google/Chrome/$PROFILE/Cache/
/Users/$USER/Library/Caches/Chromium/$PROFILE/Media Cache
/Users/$USER/Library/Caches/Google/Chrome/$PROFILE/Media Cache
/Users/$USER/Library/Application Support/Chromium/$PROFILE/Application Cache/Cache/
/Users/$USER/Library/Application Support/Google/Chrome/$PROFILE/Application Cache/Cache/
/Users/$USER/Library/Application Support/Chromium/$PROFILE/GPUCache/
/Users/$USER/Library/Application Support/Google/Chrome/$PROFILE/GPUCache/
/Users/$USER/Library/Caches/Chromium/PnaclTranslationCache/
/Users/$USER/Library/Caches/Google/Chrome/PnaclTranslationCache/

On Windows XP

TODO confirm the following paths

C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Chromium\User Data\Cache\
C:\Documents and Settings\%USERNAME%\Local Settings\Application Data\Google\Chrome\User Data\Cache\

On Windows Vista and later

C:\Users\%USERNAME%\AppData\Local\Google\Chromium\%PROFILE%\Cache\
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\%PROFILE%\Cache\
C:\Users\%USERNAME%\AppData\Local\Google\Chromium\%PROFILE%\Application Cache\Cache\
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\%PROFILE%\Application Cache\Cache\
C:\Users\%USERNAME%\AppData\Local\Google\Chromium\%PROFILE%\Media Cache\
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\%PROFILE%\Media Cache\
C:\Users\%USERNAME%\AppData\Local\Google\Chromium\%PROFILE%\GPUCache\
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\%PROFILE%\GPUCache\

The Chrome Cache contains different files with the following file names:

  • index
  • data_#; where # contains a decimal digit.
  • f_######; where # contains a hexadecimal digit.

History

Chrome stores the history of visited sites in a file named History. This file uses the SQLite database format.

The History file can be found in same location as the Preferences file.

There is also Archived History that predates information in the History file. Note that the Archived History only contains visits.

Timestamps

The History file uses the different timestamps.

visits.visit_time

The visits.visit_time is in (the number of) microseconds since January 1, 1601 UTC

Some Python code to do the conversion into human readable format:

date_string = datetime.datetime( 1601, 1, 1 )
            + datetime.timedelta( microseconds=timestamp )

Note that this timestamp is not the same as a Windows filetime which is (the number of) 100 nanoseconds since January 1, 1601 UTC

downloads.start_time

The downloads.start_time is in (the number of) seconds since January 1, 1970 UTC

Some Python code to do the conversion into human readable format:

date_string = datetime.datetime( 1970, 1, 1 )
            + datetime.timedelta( seconds=timestamp )

Example queries

Some example queries:

To get an overview of the visited sites:

SELECT datetime(((visits.visit_time/1000000)-11644473600), "unixepoch"), urls.url, urls.title FROM urls, visits WHERE urls.id = visits.url;

Note that the visit_time conversion looses precision.

To get an overview of the downloaded files:

SELECT datetime(downloads.start_time, "unixepoch"), downloads.url, downloads.full_path, downloads.received_bytes, downloads.total_bytes FROM downloads;

How the information of the downloaded files is stored in the database can vary per version of Chrome as of version 26:

SELECT datetime(((downloads.start_time/1000000)-11644473600), "unixepoch"), downloads.target_path, downloads_url_chains.url, downloads.received_bytes, downloads.total_bytes \
FROM downloads, downloads_url_chains WHERE downloads.id = downloads_url_chains.id;

Cookies

Chrome stores the cookies in a file named Cookies. This file uses the SQLite database format.

Extension Cookies

Chrome stores the cookies used by extensions in a file named Extension Cookies. This file uses the SQLite database format.

SELECT datetime(((cookies.creation_utc/1000000)-11644473600), "unixepoch"), cookies.host_key, cookies.name, cookies.value, cookies.path, \
datetime(((cookies.expires_utc/1000000)-11644473600), "unixepoch"), cookies.secure, cookies.httponly, datetime(((cookies.last_access_utc/1000000)-11644473600), "unixepoch"), \
cookies.has_expires, cookies.persistent, cookies.priority FROM cookies;

See Also

External Links

Tools

Open Source