Cyber Forensics and Investigation on Smart Devices

Author(s): Tripti Misra*, Devakrishna C. Nair, Prabhu Manikandan V and Abhishek K. Pradhan

DOI: 10.2174/9789815179576124010007

Browser Analysis and Exploitation

Pp: 71-91 (21)

Buy Chapters
  • * (Excluding Mailing and Handling)

Cyber Forensics and Investigation on Smart Devices

Browser Analysis and Exploitation

Author(s): Tripti Misra*, Devakrishna C. Nair, Prabhu Manikandan V and Abhishek K. Pradhan

Pp: 71-91 (21)

DOI: 10.2174/9789815179576124010007

* (Excluding Mailing and Handling)

Abstract

Browsers are utilized in one form or another to browse the internet since they have become an essential component of our online lives. Additionally, we may use browsers to navigate the OS's file system in addition to using them for web browsing. It has been noticed that by default, browsers save data including credit card numbers, usernames, passwords, form data, emails, and other sensitive information. Additionally, downloaded media including images, videos, executables, documents, etc. are present in browsers. A user's browsing habits and interests can be inferred from their bookmarks and browsing history. Thus, browsers keep a lot of private data about users and their browsing patterns. Due to the type and volume of data they store with them, they play a crucial role in forensics. Depending on the platform being used, there are a variety of web browsers accessible, including Safari, Chrome, Firefox, IE, and Opera. This chapter will teach us how to do forensics on various types of browsers. The following are some of the numerous places an investigator could look for evidence online like Bookmarks, Downloads, Cache, Cookies by surfing history, and many more. This chapter also discusses browser exploitation and issues involved in forensic investigation.