Mailinglist Archive
| Web Browser Forensics, Part 1
|
| From: | Joe Klemmer |
| Date: | Mon, 25 Apr 2005 21:29:58 -0400
|
Web Browser Forensics, Part 1
by Keith J. Jones and Rohyt Belani
last updated March 30, 2005
Introduction
Electronic evidence has often shaped the outcome of high-profile civil
law suits and criminal investigations ranging from theft of intellectual
property and insider trading that violates SEC regulations to proving
employee misconduct resulting in termination of employment under
unfavorable circumstances. Critical electronic evidence is often found
in the suspect's web browsing history in the form of received emails,
sites visited and attempted Internet searches. This two-part article
presents the techniques and tools commonly used by computer forensics
experts to uncover such evidence, through a fictitious investigation
that closely mimics real-world scenarios.
While you read this article, you may follow along with the investigation
and actually analyze case data. To actively participate in the
investigation, you need to download the associated Internet activity
data from the SecurityFocus archives [data].
http://www.securityfocus.com/infocus/1827?ref=rss