Web & Browser Forensics
Web & Browser Forensics is the process of identifying, collecting, analyzing, and preserving digital evidence related to user activity on web browsers and internet-based services.
Whenever a user:
- Visits a website
- Downloads a file
- Logs into a web application
- Uses social media
- Accesses cloud storage
The browser creates artifacts. These artifacts become critical evidence in cybercrime, corporate investigations, insider threat cases, and even homicide investigations.
In modern investigations, browser artifacts often become the most decisive digital evidence.
Why Web & Browser Forensics Is Critical
Today, most user activity happens inside a browser:
- Cloud storage access (Google Drive, OneDrive)
- Email services (Gmail, Outlook Web)
- Social media platforms
- Online banking portals
- Cryptocurrency exchanges
- Dark web access through Tor
Even if suspects delete files from their system, browser artifacts frequently remain.
Browser Forensics Overview
Browser-Based Evidence Types
Browser-based evidence refers to digital artifacts generated by web browsers that reflect user activity, intent, behavior patterns, and interactions with web services. These artifacts can prove access, knowledge, intent, execution, and sometimes even motive.
Below is a structured classification of browser-based evidence types.
1. Browsing History Artifacts
These records show which websites were visited and when.
Common Data Points:
- URL
- Title of webpage
- Visit timestamp
- Visit count
- Referrer URL
- Transition type (typed, link, redirect, download)
2. Download Artifacts
These reveal file acquisition through a browser. Data Includes:
- File name
- Source URL
- Target path
- Download timestamp
- Completion status
- File size
`
3. Cookies
Cookies store session and tracking data.
Types:
- Session cookies
- Persistent cookies
- Secure/HttpOnly cookies
- Third-party tracking cookies
Stored Information:
- Session identifiers
- User IDs
- Authentication tokens
4. Cache Files
Browsers cache content to improve performance. Cached Items May Include:
- HTML pages
- Images
- Videos
- JavaScript files
- Documents
5. Autofill and Form Data
Browsers store entered form information. Includes:
- Names
- Email addresses
- Phone numbers
- Addresses
- Search queries
6. Stored Credentials
Modern browsers allow password storage. Artifacts Contain:
- Saved usernames
- Encrypted passwords
- Website login URL
7. Session Data & Tabs
Browsers store session state to restore tabs after crash/restart. Includes:
- Open tabs
- Recently closed tabs
- Session timestamps
- Form states
8. Extensions and Add-ons
Extensions can:
- Modify traffic
- Inject scripts
- Steal credentials
- Bypass security controls
Example:
- Tor Browser extensions or proxy tools
- Cryptocurrency wallet extensions
9. Search Queries
Search history reveals user intent. Types:
- Local browser search records
- Google/Bing account sync searches
- Address bar searches
Investigative Value:
- Pre-crime research (weapons, poison, hacking)
- Fraud preparation
- Social engineering planning
10. IndexedDB & Local Storage
Modern web applications use client-side storage.
Contains:
- Chat fragments
- Draft messages
- Offline data
- App state data
11. Browser Sync Artifacts
If sync is enabled:
- Cross-device browsing history
- Synced passwords
- Synced bookmarks
- Device identifiers
12. Private / Incognito Mode Residual Artifacts
Even when private browsing is used. Possible Residual Evidence:
- DNS cache
- Pagefile
- Hibernation file
- RAM artifacts
- Network logs
- Proxy logs
Private browsing prevents local history storage, but not all forensic traces.
Core Data Sources for Reconstruction
A. Browser Artifacts
Common browsers:
- Google Chrome, Mozilla Firefox, Microsoft Edge
Artifacts used:
- History databases
- Download records
- Cookies & Autofill data
- Session restore files
- IndexedDB and local storage
These reveal:
- Research behavior
- Login sessions
- File acquisition
- Webmail activity
B. Operating System Artifacts
Correlate browser evidence with:
- Event logs
- Prefetch files
- ShimCache
- Amcache
- Jump Lists
- Recent files
- LNK files
- Registry keys
This confirms:
- Program execution
- File access patterns
- User logon sessions
- Persistence mechanisms
C. File System & Storage Artifacts
- File creation/modification times
- USB device logs
- Cloud sync folders
- Deleted file recovery
- Volume shadow copies
These show:
- Data staging
- Exfiltration preparation
- File wiping attempts
- Anti-forensic activity
D. Network & Cloud Logs
- Firewall logs
- Proxy logs
- VPN connection logs
- Cloud authentication logs
- MFA challenges
- IP geolocation records
Critical in:
- Insider threat
- Account takeover
- Remote access attribution
The Reconstruction Process
Step 1: Establish Baseline Timeline
Create a unified timeline combining:
- Browser timestamps
- OS logs
- File system timestamps
- Network events
Step 2: Identify Behavioral Patterns
Look for:
- Repeated access to specific domains
- Gradual escalation (research → tool download → execution)
- Time-of-day usage patterns
- Sudden spike in activity before incident
- Clearing logs after suspicious events
Step 3: Detect Intent Indicators
Intent indicators may include:
- Search queries about illegal activities
- Visiting instructional websites
- Downloading hacking tools
- Accessing cryptocurrency exchanges
- Use of anonymity tools such as Tor Browser
Step 4: Identify Concealment Attempts
Common concealment behavior:
- Clearing browser history
- Deleting download logs
- Wiping temporary files
- Using private browsing
- Installing VPN clients
- Secure deletion utilities
Step 5: Correlate Multi-Device Activity
If sync is enabled:
- Browser sync artifacts
- Cloud login logs
- Cross-device timestamps
- Mobile + desktop overlap
This helps attribute actions across:
- Work laptop
- Personal desktop
- Mobile device
Behavioral Indicators in Different Case Types
Corporate Data Theft
Behavioral flow:
- Access confidential files
- Copy to staging folder
- Upload to cloud storage
- Clear recent files
- Resign within days
Cyber Fraud
Pattern:
- Research target organization
- Create fake email
- Register domain
- Draft phishing template
- Launch attack
- Monitor responses
Dark Web Activity
Flow:
- Install Tor
- Visit onion links
- Download encrypted archives
- Cryptocurrency wallet activity
Violent Crime / Premeditation
Pattern:
- Search for weapons
- Research victim schedule
- Access maps
- Delete search history
Browser evidence often establishes mens rea (criminal intent).
Advanced Techniques for Expert-Level Reconstruction
For senior investigators:
- SQLite WAL recovery
- Deleted record carving
- Memory artifact extraction
- Correlation of browser sessions with RAM dumps
- Time skew detection
- Timestomp analysis
- Log gap analysis
- Machine learning clustering of user activity
These methods transform raw artifacts into a behavioral narrative.
Behavioral Timeline Example
08:12 AM – User logs into system
08:15 AM – Searches “how to bypass company firewall”
08:17 AM – Downloads network tunneling tool
08:25 AM – Executes tool (Prefetch confirms)
08:27 AM – Connects to remote IP (Firewall log)
08:40 AM – Uploads archive to cloud storage
08:45 AM – Clears browser history
This sequence demonstrates planning, execution, and concealment.
Browser Forensic Challenges
Browser forensics is one of the most evidence-rich domains in digital investigations. However, it is also one of the most technically challenging due to constant software updates, privacy features, encryption, and cloud integration.
Volatile Memory Dependency
Some artifacts exist only in RAM:
- Active sessions
- Unsaved form data
- Decrypted credentials
- Private browsing sessions
If live acquisition is not performed:
- Critical evidence may be lost permanently.
Browser-Based Applications (Web Apps)
Modern applications use:
- IndexedDB
- Local Storage
- Service Workers
- Progressive Web Apps
Challenges:
- Artifacts spread across multiple storage layers
- Non-standard storage locations
- Tool parsing limitations
Cloud Synchronization Complexity
If browser sync is enabled:
- History may be stored in the cloud
- Passwords synced across devices
- Bookmarks replicated
Challenges:
- Activity may originate from another device
- Timeline discrepancies
- Jurisdictional issues in cloud data acquisition
- Legal process delays for account data
Timeline Inconsistencies
Browser timestamps may be:
- Stored in WebKit epoch format
- Affected by timezone settings
- Impacted by system clock manipulation
- Altered by time skew or CMOS tampering
Challenge:
- Incorrect conversion can misrepresent activity timing.
Expert Requirement:
- Always verify timestamp format and timezone offsets manually.
Rapid Browser Updates & Schema Changes
Modern browsers like:
- Google Chrome
- Mozilla Firefox
- Microsoft Edge
Challenges:
- SQLite schema changes
- New artifact storage structures
- Modified encryption mechanisms
- Deprecated fields
Impact:
- Older forensic tools may misinterpret databases
- Timestamps may be parsed incorrectly
- Fields may appear empty due to version mismatch
Encryption of Stored Data
Modern browsers encrypt:
- Saved passwords
- Cookies & Autofill data
- Session tokens
Encryption mechanisms depend on:
- OS-level APIs (e.g., DPAPI in Windows)
- User login credentials
- Hardware-bound keys
Challenges:
- Dead box acquisition without user password
- BitLocker-encrypted drives
- Domain-controlled systems
- Remote imaging without proper key capture
Without proper key material, decryption may be impossible.
Private / Incognito Mode
Private browsing prevents local history storage.
However, challenges include:
- No standard history database entries
- Reduced persistent artifacts
- Volatile memory dependency
- Limited session retention
Although traces may remain in:
- DNS cache
- Pagefile
- RAM dumps
- Network logs
Investigators must rely on cross-artifact correlation rather than browser databases alone.
Multi-Device and Multi-User Environments
Common complications:
- Shared systems
- Multiple browser profiles
- Guest accounts
- Virtual machines
- Portable browser versions
Challenge: Attribution becomes difficult.
Investigators must correlate:
- User logon sessions
- Profile directories
- Registry artifacts
- File ownership metadata
Anti-Forensic Techniques
Suspects may attempt:
- Clearing browsing history
- Deleting cache
- Using secure deletion tools
- Installing privacy-focused browsers
- Using anonymity networks like Tor Browser
- Running portable browsers from USB
Challenge: Artifacts may be partially destroyed.
Countermeasure:
- WAL file recovery
- Deleted SQLite record carving
- Volume shadow copy analysis
- RAM artifact extraction
Anti-forensic behavior itself can become evidence of intent.
Encrypted Traffic & HTTPS
Almost all web traffic now uses HTTPS.
Challenges:
- Content cannot be viewed via simple packet capture
- Payload inspection is limited
- TLS encryption prevents content reconstruction
Investigators must rely on:
- SNI records
- DNS logs
- Proxy logs
- Browser history artifacts
Network analysis alone is no longer sufficient.
Browser Artifacts Analysis
Browser artifacts analysis is the examination of data generated by web browsers to understand user activity, intent, and behavior.
Modern browsers such as Google Chrome, Mozilla Firefox, and Microsoft Edge create numerous artifacts during normal usage. These artifacts can serve as critical digital evidence in investigations.
What Are Browser Artifacts?
Browser artifacts are digital traces left behind when a user:
- Visits websites
- Searches for information
- Downloads files
- Logs into accounts
- Fills out forms
- Installs extensions
These traces are typically stored in structured databases (often SQLite), cache directories, configuration files, and encrypted storage areas.
Common Types of Browser Artifacts
- Browsing History: Records of visited URLs, page titles, visit timestamps, and visit frequency.
- Download Records: Information about downloaded files, including source URL, file name, and timestamps.
- Cookies: Small data files storing session identifiers, login tokens, and user preferences.
- Cache Files: Stored copies of web pages, images, scripts, and documents.
- Autofill and Form Data: Saved entries such as names, emails, addresses, and search terms.
- Stored Credentials: Saved usernames and encrypted passwords.
- Extensions and Add-ons: Installed browser plugins and their associated permissions and metadata.
Why It Matters in Investigations
Browser artifact analysis helps investigators:
- Reconstruct user activity timelines
- Identify pre-incident research behavior
- Link a user to specific accounts or websites
- Detect data exfiltration via web services
- Identify concealment attempts (e.g., cleared history)
In many cybercrime, insider threat, and fraud investigations, browser artifacts provide direct insight into planning and execution stages.
Overview: Google Chrome, Microsoft Edge, Mozilla Firefox
In browser forensics, three major browsers dominate most investigations:
- Google Chrome
- Microsoft Edge
- Mozilla Firefox
Understanding their architecture and artifact storage is essential for accurate evidence analysis.
Google Chrome
Google Chrome is Chromium-based and stores most artifacts in SQLite databases within the user profile directory.
Key Forensic Artifacts:
- History (URLs, visit timestamps)
- Cookies
- Login Data (saved credentials – encrypted)
- Web Data (autofill, form entries)
- Downloads
- Extensions folder
- Cache directory
- Bookmarks
Microsoft Edge
Modern Microsoft Edge is also Chromium-based, meaning its structure is very similar to Chrome.
Key Forensic Artifacts:
- History (SQLite database)
- Cookies (encrypted)
- Login Data (encrypted credentials)
- Downloads database
- Extensions
- Session restore files
- Cache storage
Mozilla Firefox
Mozilla Firefox differs structurally because it is not Chromium-based.
Key Forensic Artifacts:
- places.sqlite (history and bookmarks)
- cookies.sqlite
- logins.json (saved credentials)
- formhistory.sqlite
- sessionstore.jsonlz4 (session data)
- Cache folders
- Extensions directory
History, Cache, Cookies, Downloads
These four artifacts form the foundation of browser forensic analysis. They provide direct insight into user activity, intent, and behavior.
Modern browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox store these artifacts in structured formats (commonly SQLite databases and cache directories).
Browsing History
A record of websites visited by the user.
Typically Contains
- URL
- Page title
- Visit timestamp
- Visit count
- Referrer URL
- Transition type (typed, link, redirect)
Cache
Temporary storage of web content to improve loading speed.
May Contain
- HTML pages
- Images
- Videos
- JavaScript files
- Document fragments
Cookies
Small data files stored by websites on the user’s system.
May Contain
- Session IDs
- Authentication tokens
- User IDs
- Preferences
- Tracking identifiers
Downloads
A record of files downloaded via the browser.
Typically Contains
- File name
- Source URL
- Target save path
- Download start/end time
- File size
- Completion status
Autofill, Saved Passwords, Sessions
In browser forensics, these three artifacts are highly valuable because they directly reflect user interaction, account usage, and session continuity.
Modern browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox store this data within user profile directories, often in SQLite databases, JSON files, and encrypted storage.
Autofill Data
Autofill stores information that users enter into web forms and choose to save for convenience.
Commonly Stored Data
- Names
- Email addresses
- Phone numbers
- Physical addresses
- Search terms
- Payment-related metadata (non-full card details in most cases)
Saved Passwords
Browsers allow users to store login credentials for websites.
Typically Contains
- Website login URL
- Username
- Encrypted password
Encryption:
- Chromium-based browsers use OS-level encryption mechanisms.
- Firefox uses encrypted credential storage tied to profile keys.
Session Data
Session artifacts maintain information about active or recently open browser tabs and states.
May Include
- Open tabs at last shutdown
- Recently closed tabs
- Session timestamps
- Form state data
- Crash recovery data
IndexedDB, Local Storage, WebSQL
Modern web applications no longer rely only on cookies. They use client-side storage mechanisms to store structured data directly inside the browser. From a forensic perspective, these storage systems can contain highly valuable evidence. Commonly encountered in browsers like Google Chrome, Microsoft Edge, and Mozilla Firefox.
These artifacts are often overlooked but can contain chat fragments, authentication tokens, draft messages, and application state data.
IndexedDB
IndexedDB is a low-level, NoSQL-style database built into modern browsers. It allows web applications to store large amounts of structured data locally.
Characteristics
- Structured key-value storage
- Supports large datasets
- Used by complex web apps
- Data stored per website (origin-based storage)
WebSQL
WebSQL is a deprecated web database API that allows websites to use SQLite databases within the browser.
Characteristics
- SQLite-based structure
- Not widely supported in modern browsers
- Still found in legacy applications
Local Storage
Local Storage is a simpler key-value storage system within the browser.
Characteristics
- Stores data as string key-value pairs
- Persistent across browser sessions
- Limited storage size compared to IndexedDB
May Contain
- User preferences
- Session flags
- Authentication tokens
- UI state settings
- Partial chat or message content
Web Activity & Attack Investigation – Overview
Web Activity & Attack Investigation focuses on identifying, analyzing, and reconstructing malicious or suspicious activity conducted through web browsers and internet-based platforms.
In modern cases, most cyber incidents involve web-based interaction whether it is phishing, data exfiltration, insider misuse, credential theft, or dark web activity. Browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox often become primary evidence sources.
What Is Web Activity Investigation?
Web activity investigation involves examining browser and network artifacts to determine:
- Which websites were accessed
- What actions were performed
- What data was downloaded or uploaded
- Whether credentials were entered
- Whether malicious tools were acquired
What Is Web Attack Investigation?
Web attack investigation focuses specifically on:
- Web-based malware delivery
- Phishing attacks
- Credential harvesting
- Exploit kit usage
- Drive-by downloads
- Web shell activity
- Data exfiltration via web services
Common Investigation Scenarios
1. Phishing Incident
- User visits phishing domain
- Credentials entered
- Session cookies stored
- Account takeover follows
2. Malware Download
- Suspicious domain visited
- Executable downloaded
- File executed
- Persistence established
3. Data Exfiltration
- Sensitive files staged
- Cloud storage accessed via browser
- Files uploaded
- History cleared
4. Dark Web or Anonymous Access
- Privacy tools installed
- Onion links accessed
- Cryptocurrency sites visited
Downloaded Payload Identification – Overview
Downloaded Payload Identification is the forensic process of determining what was downloaded via a browser, whether it was malicious, and what role it played in an incident.
In web-based attacks, the browser is often the initial delivery vector. Identifying the downloaded payload helps establish:
- Initial infection point
- User intent or victim interaction
- Execution timeline
- Impact scope
What Is a Payload?
A payload is the malicious component delivered during an attack. It may be:
- Executable malware (EXE, DLL)
- Script files (JS, VBS, PowerShell)
- Office documents with macros
- PDF exploits
- Compressed archives (ZIP, RAR)
- Disk images (ISO)
- Loader or dropper files
Initial Identification Sources
A. Browser Download Records
Typically contain:
- File name
- Source URL
- Target save path
- Download start/end timestamps
- File size
- Completion status
B. File System Artifacts
Correlate with:
- File creation and modification timestamps
- $MFT entries
- Alternate Data Streams
- Zone.Identifier (Mark-of-the-Web)
- Prefetch execution traces
C. Prefetch & Execution Evidence
If the payload was executed:
- Prefetch files confirm program launch
- Amcache entries record execution metadata
- ShimCache may reflect prior execution
- Event logs may show process creation
Verification Techniques
Once the file is identified:
1. Hash Calculation
- Generate MD5/SHA1/SHA256
- Compare with threat intelligence databases
- Identify known malware families
2. File Type Verification
- Confirm true file type (magic bytes)
- Detect disguised extensions (e.g., invoice.pdf.exe)
3. Static Analysis Indicators
- Suspicious strings
- Embedded URLs
- Obfuscated code
- Suspicious imports
4. Dynamic Indicators (If Applicable)
- Network beaconing
- File drops
- Registry persistence
- Scheduled task creation
Common Web-Based Delivery Scenarios
Phishing Attachment Download
- User visits phishing link
- Downloads document
- Enables macro
- Payload drops secondary malware
Drive-by Download
- User visits compromised website
- Exploit triggers automatic payload delivery
- Minimal user interaction
Fake Software Update
- “Update Flash Player” page
- Downloads installer
- Installs backdoor
Compressed Archive Delivery
- ZIP file downloaded
- Contains loader script
- Extracted and executed
Phishing Website Analysis – Overview
Phishing website analysis is the forensic and technical process of examining a fraudulent website designed to steal credentials, financial data, or sensitive information.
Phishing analysis typically answers:
- Was the website malicious?
- What data was targeted?
- Did the victim submit credentials?
- Was any payload delivered?
- Who is behind the infrastructure?
What Is a Phishing Website?
A phishing site is a fake webpage that impersonates a legitimate entity such as:
- Banks
- Email providers
- Government portals
- E-commerce platforms
- Corporate login portals
Attackers often clone legitimate sites like:
- State Bank of India
- HDFC Bank
- Microsoft
The objective is credential harvesting, OTP interception, financial fraud, or malware delivery.
Web-Based Malware Delivery – Overview
Web-based malware delivery refers to the techniques attackers use to distribute malicious code through websites, browsers, and web services. In modern intrusions, the browser is often the initial access vector.
For a digital forensics investigation, this domain connects: Browser artifacts → Network evidence → Downloaded payload → Execution → Persistence
Common Web-Based Delivery Methods
1. Phishing Landing Pages
The victim clicks a malicious link and lands on a cloned login page (often impersonating organizations like Microsoft or Google).
Attack outcomes:
- Credential harvesting
- Malware download (ZIP, ISO, EXE)
- Fake CAPTCHA loaders
2. Drive-By Downloads
The user visits a compromised website.
No intentional download required.
Attack flow:
- Malicious script runs in browser
- Exploit kit fingerprints system
- Payload delivered silently
This often leverages browser vulnerabilities or outdated plugins.
3. Malvertising
Malicious ads embedded within legitimate websites.
User visits trusted site → Ad iframe loads malicious script → Redirect to exploit server → Payload delivery.
4. Fake Software Updates
Popups like:
- “Update your browser”
- “Update Flash Player”
- “Security certificate expired”
The user downloads and executes a trojanized installer.
5. Compromised CMS Websites
Attackers inject malicious JavaScript into WordPress or other CMS platforms.
Injected code:
- Redirects selectively
- Loads obfuscated JavaScript
- Drops first-stage loader
6. File-Sharing & Cloud Abuse
Attackers host malware on:
- Public cloud drives
- Temporary file-sharing services
- Code repositories
The link appears legitimate because it uses known infrastructure.
Typical Payload Types Delivered via Web
- Executable files (.exe)
- Script files (.js, .vbs, .ps1)
- Office documents with macros
- PDF exploits
- ISO/IMG containers
- HTML smuggling files
- Browser extensions
HTML smuggling is increasingly used to bypass perimeter security by reconstructing malware locally in the browser.
Web Server & Application Forensics – Overview
Web Server & Application Forensics is the process of investigating security incidents involving web servers, hosted applications, APIs, and backend infrastructure.
This area is critical when investigating:
- Website defacement
- Data breaches
- SQL injection attacks
- Web shell deployment
- Ransomware entry via web apps
- Unauthorized admin access
- API abuse
For a senior digital forensics consultant, this domain connects system-level evidence with application-layer attack traces.
Key Evidence Sources
A. Web Server Access Logs
Contain:
- Client IP address & Timestamp
- HTTP method (GET, POST, PUT)
- Requested resource
- Status code (200, 404, 500)
- User-agent & Referrer
Used to detect:
- Suspicious POST requests
- SQL injection attempts
- Directory traversal
- Brute-force login attempts
C. Application Logs
May include:
- User login attempts & Admin activity
- API calls
- File uploads
- Password reset attempts
B. Error Logs
Reveal:
- SQL errors
- Script failures
- Permission issues
- Stack traces
Useful for identifying:
- Injection testing
- Broken authentication flaws
D. Database Logs
Help determine:
- Suspicious queries
- Data export operations
- Unauthorized table access
- Privilege escalation
Common Attack Patterns
1. SQL Injection
Indicators:
- ‘ OR 1=1 —
- UNION SELECT
- Database error messages in responses
2. Web Shell Deployment
Attacker uploads malicious PHP/ASP file.
Common filenames:
- shell.php
- cmd.php
- upload.php
Indicators:
- Unexpected files in upload directories
- Base64-encoded code
- Eval() usage
3. Directory Traversal
Requests containing:
- ../
- %2e%2e/
4. Brute-Force Attacks
- Multiple POST requests to login endpoint
- Repeated failed login attempts
5. Remote Code Execution (RCE)
- Unusual command execution
- New processes spawned by web service account
SQL Injection & Web Shell Traces
SQL injection and web shell deployment are two of the most common techniques used in web server compromises. In many breach cases, the attack chain follows this pattern: Recon → SQL Injection → File Upload / RCE → Web Shell → Persistence → Data Exfiltration
Understanding trace evidence at each stage is critical for accurate reconstruction.
1. SQL Injection
SQL Injection (SQLi) occurs when attacker-controlled input is interpreted as part of a database query.
Typical exploitation targets:
- Login forms
- Search fields
- URL parameters
- API endpoints
Applications backed by systems like MySQL or Microsoft SQL Server are common targets.
A. Web Server Log Indicators
In logs from servers like Apache HTTP Server, Nginx, or Microsoft IIS, look for:
Suspicious Query Patterns
- ‘ OR 1=1 —
- UNION SELECT
- information_schema
- xp_cmdshell
- SLEEP()
- BENCHMARK()
Example suspicious request:
GET /product.php?id=10 UNION SELECT username,password FROM users
Encoded Payloads
- %27 (URL encoded single quote)
- %2F%2A (encoded comment markers)
- Hex-encoded strings
B. Error Log Evidence
Database errors appearing after specific requests:
- SQL syntax errors
- Unknown column errors
- Unclosed quotation mark errors
These often indicate the injection testing phase.
C. Application Log Indicators
Look for:
- Multiple failed authentication attempts
- Abnormal query patterns
- Debug error outputs
- Unexpected admin logins after injection attempt
D. Database Log Indicators
- Unusual SELECT queries
- Access to system tables
- Dump of user tables
- Creation of new admin accounts
- Usage of dangerous stored procedures (xp_cmdshell in MSSQL)
2. Web Shell Deployment
A web shell is a malicious script uploaded to a web server that allows remote command execution through HTTP.
Common file extensions:
- .php
- .aspx
- .jsp
- .ashx
A. File System Indicators
- Recently modified files in web root
- Unexpected files in upload directories
- Suspicious filenames:
- shell.php
- cmd.php
- upload.php
- 1.php
- test.aspx
Indicators inside file:
- eval()
- base64_decode()
- system()
- exec()
- passthru()
B. Web Server Log Indicators of Web Shell Use
Look for:
Repeated access to same suspicious file:
GET /uploads/shell.php
POST requests with parameters like:
cmd=whoami
cmd=ipconfig
cmd=cat /etc/passwd
Indicators:
- High frequency requests
- Large POST bodies
- Commands embedded in URL parameters
C. Process Execution Traces
On Linux:
- Suspicious processes spawned by www-data
- Bash history anomalies
- New cron jobs
On Windows:
- cmd.exe or powershell.exe spawned by w3wp.exe
- Event logs showing process creation
- Scheduled tasks created
D. Outbound Network Connections
Web shells often used to:
- Download secondary payload
- Connect to C2 server
- Exfiltrate data
Look for:
- Unexpected outbound traffic
- Reverse shell connections
- Large data transfers
Unauthorized Access Detection
Unauthorized access detection is the process of identifying and validating access to systems, applications, or data by individuals who are not permitted to do so.
In digital forensics and incident response, this typically answers:
- Who accessed the system?
- Was the access legitimate?
- What actions were performed?
- Was data modified or exfiltrated?
- Was persistence established?
Unauthorized access can occur at multiple layers:
- Operating system level
- Application level
- Database level
- Network level
- Cloud account level
1. Types of Unauthorized Access
1. External Intrusion
- Brute-force attack
- Credential stuffing
- Exploited vulnerability
- Phishing-based credential theft
2. Insider Misuse
- Privilege abuse
- Unauthorized data export
- Admin role misuse
3. Account Takeover
- Valid credentials used from unusual IP/location
- Session hijacking
- Token theft
4. Lateral Movement
- Compromised user accessing additional systems
2. Detection at Operating System Level
Windows Systems
Investigate:
- Successful logins (Event ID 4624)
- Failed logins (Event ID 4625)
- Account lockouts
- Privilege assignments
- New user account creation
- Scheduled task creation
- Service installation
Look for:
- Logins at unusual hours
- Remote logins (RDP)
- Admin privilege usage by non-admin account
- Multiple failed attempts followed by success
Linux Systems
Check:
- /var/log/auth.log
- /var/log/secure
- /var/log/wtmp
- /var/log/btmp
- .bash_history
Indicators:
- SSH login from unfamiliar IP
- Sudo privilege use
- New user creation
- Cron job creation
3. Web Server & Application Level Detection
From servers like:
- Apache HTTP Server
- Nginx
- Microsoft IIS
Investigate:
- Repeated login attempts
- Successful login after multiple failures
- Suspicious admin panel access
- Upload of unexpected files
- Password reset abuse
- Role changes
Application logs are critical to confirm:
- Which user logged in
- What actions were performed
- What data was accessed
4. Database-Level Detection
Investigate:
- Unusual SELECT queries
- Data export commands
- Access to system tables
- Privilege escalation in database
- New database user creation
Look for:
- Large data retrieval
- Off-hours database access
- Queries executed via web application account
5. Network-Level Indicators
- New outbound connections
- Remote login from foreign IP
- VPN logins outside business hours
- Unusual internal scanning
- Suspicious DNS queries
Correlate: IP address → Login event → Data access → Outbound traffic
6. Behavioral Indicators
Unauthorized access often reveals behavioral anomalies:
- Login from different geographic region
- Sudden spike in data access
- Multiple systems accessed rapidly
- Admin tasks performed by normal user
- Disabled security controls
- Cleared event logs
Behavioral deviation analysis is key in modern investigations.
Privacy & Anti-Forensics – Investigative Overview
Privacy and Anti-Forensics are closely related but conceptually different domains.
- Privacy techniques are legitimate methods used to protect personal data and anonymity.
- Anti-forensics refers to deliberate actions taken to hinder, mislead, or obstruct forensic investigations.
1. Privacy Techniques (Legitimate Protection Mechanisms)
Privacy tools are designed to:
- Protect identity
- Prevent tracking
- Secure communications
- Encrypt data
- Reduce metadata exposure
Common privacy technologies include:
- End-to-end encryption
- VPN services
- Secure messaging
- Full disk encryption
- Private browsing modes
- Encrypted cloud storage
Examples of privacy-focused tools include:
- Tor Browser
- Signal
- VeraCrypt
- Proton Mail
4. Browser-Level Anti-Forensics
- Private browsing mode
- History deletion
- Cookie clearing
- Encrypted DNS
- Tor routing
Browsers like Google Chrome and Mozilla Firefox allow private sessions.
Important: Private browsing reduces local artifacts but does not eliminate all traces.
5. Cloud & Account Anti-Forensics
Attackers may:
- Delete cloud logs
- Revoke audit logging
- Remove email traces
- Delete shared links
- Destroy MFA recovery logs
Cloud logging misconfiguration is a common investigative challenge.
6. Network-Level Anti-Forensics
- VPN chaining
- Tor routing
- Proxy hopping
- Fast-flux DNS
- IP spoofing (limited contexts)
Purpose: Obfuscate attribution.
7. Indicators of Anti-Forensic Intent
High-confidence indicators include:
- Logs cleared immediately after suspicious activity
- Security tools disabled
- Audit policy modified
- Backup deletion
- Encryption activated post-incident
- Timestamp inconsistencies
- Rapid account deletion
Intent matters in legal interpretation.
2. Anti-Forensics
Anti-forensics refers to techniques designed to:
- Destroy evidence
- Conceal evidence
- Manipulate evidence
- Mislead investigators
- Delay analysis
3. Major Categories of Anti-Forensics
a. Data Destruction
- Secure file wiping
- Disk overwriting
- Log deletion
- Event log clearing
- File shredding utilities
Indicators:
- Event log ID 1102 (log cleared)
- Recently deleted log files
- Wiped unallocated space
b. Encryption as Anti-Forensic Measure
While encryption is legitimate, it becomes anti-forensic when:
- Activated after compromise
- Used selectively on suspicious files
- Encryption keys are destroyed
- Ransomware encrypts system data
c. Log Manipulation
Attackers may:
- Delete access logs
- Modify timestamps
- Disable logging services
- Alter audit policies
- Overwrite log rotation
Indicators:
- Gaps in log timeline
- Sudden service restarts
- Modified file metadata
d. Timestomping
Altering file timestamps to mislead investigators.
Indicators:
- $MFT timestamps inconsistent
- File creation date older than OS install
- MAC times mismatch
e. File Obfuscation & Steganography
- Renaming malicious files
- Hiding payloads in images
- Base64 encoding scripts
- Packing executables
f. Living-Off-The-Land Techniques
Using legitimate system tools to avoid detection:
- PowerShell
- WMI
- MSHTA
- Rundll32
g. Virtualization & Sandbox Evasion
Malware may:
- Detect virtual machines
- Check for debugger presence
- Delay execution
- Use geolocation filtering
Private Browsing Artifacts
Private browsing (Incognito / InPrivate mode) is designed to prevent local retention of browsing data after the session ends. However, it does not mean “no forensic artifacts.” It means “limited persistent artifacts.”
As a forensic investigator, the key question is: Can we prove that private browsing was used, and can we recover traces of activity?
The answer is often yes – partially.
Browsers commonly involved:
- Google Chrome (Incognito Mode)
- Mozilla Firefox (Private Window)
- Microsoft Edge (InPrivate Mode)
1. What Private Browsing Actually Does
During a private session, the browser typically:
- Does not save history permanently
- Does not retain cookies after session ends
- Does not store form autofill data
- Deletes session cache on close
It does NOT:
- Hide activity from ISP
- Prevent network logging
- Prevent system-level artifacts
- Prevent memory artifacts
- Prevent DNS caching
- Prevent downloaded file traces
2. Direct Artifacts (Limited but Possible)
A. Active Session Artifacts (If Browser Not Closed)
If acquisition happens before closing the private window:
- Temporary SQLite records may exist
- In-memory history entries present
- Cookies still active
- Cached files still accessible
Memory acquisition becomes critical.
B. Download Artifacts
If a file is downloaded in private mode:
- File remains on disk
- Zone.Identifier (Mark-of-the-Web) present
- $MFT timestamps recorded
- Prefetch created if executed
- Amcache entry may exist
- RecentFiles entries may exist
Download history entries may be deleted, but file system traces remain.
3. Indirect Forensic Artifacts
Private browsing leaves indirect traces in other system components.
A. DNS Cache
Windows:
- ipconfig /displaydns (live system)
- DNS cache artifacts in memory
Linux:
- systemd-resolved logs (if enabled)
B. Pagefile & Hibernation File
Even if history is not saved:
- Visited URLs
- Search queries
- Page content fragments
- Session tokens
May be recoverable from:
- pagefile.sys
- hiberfil.sys
C. Memory (RAM)
If a private session was active during seizure, memory acquisition is a high priority. Memory forensics may reveal:
- Full URLs visited
- HTML content
- Form inputs
- Session cookies
- Search terms
D. Windows Event Logs
No direct “private browsing” log, but:
- Process creation logs show browser launch
- Command line arguments may show incognito flag
Example: chrome.exe –incognito
E. Prefetch Files
Prefetch confirms:
- Browser execution time
- Number of runs
- Last execution timestamp
Does not confirm private mode directly, but helps timeline reconstruction.
