Skip to content
Ulf Frisk edited this page Sep 28, 2023 · 3 revisions

The forensic/web directory

The directory forensic/web exists as a sub-directory to the file system root.

The directory is hidden by default. It will appear once forensic mode has been started and processing is completed.

The directory contain web browser related information such as browser history from supported web browsers.

The files in the misc/web directory are listed in the table below:

File Description
readme.txt General information about the web module.
web.txt Web browser history.

Files in the forensic/web directory are read-only.

Supported web browsers

Supported Browser
Brave
Google Chrome
Microsoft Edge (new)
Mozilla Firefox

Internet Explorer, Microsoft Edge (old) and many other browsers are not supported. Chromium-based browsers not listed may sometimes be detected as Chrome.

Recoverable events

The web module may recover, by using a best-effort algorithm, events related to:

Type Description
VISIT Page visit.
DOWNLOAD File download.
LOGINPWD Saved login data. (The actual password is not recovered by MemProcFS but is often recoverable manually).

The web browser contains many more events, such as cookies, which is not parsed by MemProcFS. Events may be recovered from active and recently closed web browsers.

Example

The example shows the forensic/web directory with the files readme.txt and web.txt. The web.txt contains web browser information.

For Developers

The forensic/web sub-directory is implemented as a built-in native C-code plugin. The plugin source is located in the file modules/m_fc_web.c in the vmm project.

Clone this wiki locally