Browser Analysis and Exploitation
- Authors: Tripti Misra1, Devakrishna C. Nair2, Prabhu Manikandan V3, Abhishek K. Pradhan4
-
View Affiliations Hide AffiliationsAffiliations: 1 School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India 2 School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India 3 School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India 4 School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India
- Source: Cyber Forensics and Investigation on Smart Devices , pp 71-91
- Publication Date: June 2024
- Language: English
Browser Analysis and Exploitation, Page 1 of 1
< Previous page | Next page > /docserver/preview/fulltext/9789815179576/chapter-4-1.gifBrowsers are utilized in one form or another to browse the internet since they have become an essential component of our online lives. Additionally, we may use browsers to navigate the OS's file system in addition to using them for web browsing. It has been noticed that by default, browsers save data including credit card numbers, usernames, passwords, form data, emails, and other sensitive information. Additionally, downloaded media including images, videos, executables, documents, etc. are present in browsers. A user's browsing habits and interests can be inferred from their bookmarks and browsing history. Thus, browsers keep a lot of private data about users and their browsing patterns. Due to the type and volume of data they store with them, they play a crucial role in forensics. Depending on the platform being used, there are a variety of web browsers accessible, including Safari, Chrome, Firefox, IE, and Opera. This chapter will teach us how to do forensics on various types of browsers. The following are some of the numerous places an investigator could look for evidence online like Bookmarks, Downloads, Cache, Cookies by surfing history, and many more. This chapter also discusses browser exploitation and issues involved in forensic investigation.
-
From This Site
/content/books/9789815179576.chapter-4dcterms_subject,pub_keyword-contentType:Journal105