Difference between pages "Opera" and "JTAG Forensics"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(Global history)
 
(Procedures)
 
Line 1: Line 1:
{{expand}}
+
== Definition ==
 +
=== From Wikipedia ([http://en.wikipedia.org/wiki/Joint_Test_Action_Group http://en.wikipedia.org/wiki/Joint_Test_Action_Group ]): ===
  
== Data directory ==
+
Joint Test Action Group (JTAG) is the common name for what was later standardized as the IEEE 1149.1 Standard Test Access Port and Boundary-Scan Architecture. It was initially devised for testing printed circuit boards using boundary scan and is still widely used for this application. Today JTAG is also widely used for IC debug ports. In the embedded processor market, essentially all modern processors support JTAG when they have enough pins. Embedded systems development relies on debuggers talking to chips with JTAG to perform operations like single stepping and breakpointing. Digital electronics products such as cell phones or a wireless access point generally have no other debug or test interfaces.
Opera stores the user data in the following locations:
+
  
On Linux:
+
=== Forensic Application ===
<pre>
+
/home/$USER/.opera/
+
</pre>
+
  
=== Typed history ===
+
JTAG forensics is an acquisition procedure which involves connecting to the Standard Test Access Port (TAPs) on a device and instructing the processor to transfer the raw data stored on connected memory chips. Jtagging supported phones can be an extremely effective technique to extract a full physical image from devices that cannot be acquired by other means.
The file '''typed_history.xml''' contains the history of the URLs typed in the address bar by the user.
+
  
=== Search field history ===
+
== Tools and Equipment ==
  
The file '''search_field_history.dat''' is an XML file that contains the history of queries typed in the search bar by the user.
+
* [[JTAG and Chip-Off Tools and Equipment]]
  
=== Global history ===
+
== Procedures ==
The file '''global_history.dat''' is a text file.
+
  
<pre>
+
* [[JTAG HTC Wildfire S]]
Welcome to Opera
+
* [[JTAG LG P930 (Nitro HD)]]
http://www.opera.com/portal/upgrade/
+
* [[JTAG Samsung Galaxy S4 (SGH-I337)]]
1319089117
+
* [[JTAG Huawei TracFone M865C]]
-1
+
</pre>
+
 
+
Where the fields are:
+
* Title
+
* URL
+
* date and time (32-bit POSIX or Unix epoch timestamp)
+
 
+
== External Links ==
+
 
+
* [http://www.opera.com/ Official website]
+
 
+
[[Category:Applications]]
+
[[Category:Web Browsers]]
+

Revision as of 19:18, 11 September 2013

Contents

Definition

From Wikipedia (http://en.wikipedia.org/wiki/Joint_Test_Action_Group ):

Joint Test Action Group (JTAG) is the common name for what was later standardized as the IEEE 1149.1 Standard Test Access Port and Boundary-Scan Architecture. It was initially devised for testing printed circuit boards using boundary scan and is still widely used for this application. Today JTAG is also widely used for IC debug ports. In the embedded processor market, essentially all modern processors support JTAG when they have enough pins. Embedded systems development relies on debuggers talking to chips with JTAG to perform operations like single stepping and breakpointing. Digital electronics products such as cell phones or a wireless access point generally have no other debug or test interfaces.

Forensic Application

JTAG forensics is an acquisition procedure which involves connecting to the Standard Test Access Port (TAPs) on a device and instructing the processor to transfer the raw data stored on connected memory chips. Jtagging supported phones can be an extremely effective technique to extract a full physical image from devices that cannot be acquired by other means.

Tools and Equipment

Procedures