Tag Archives: Private Browsing

incognito forensics

Incognito Forensics Update

Intro As we wrap things up for the semester, we have begun artifact research for our incognito forensics project, imaging the virtual machine and importing it into FTK. We encountered a problem when searching for incognito artifacts due to the fact that the general browsing session artifacts were also on the incognito virtual machine. We […]

Continue reading
incognito forensics

Incognito Mode Project Update

introduction At this point in our research, we are using a forensic imaging tool called FTK Imager, which allows us to image the browsing data we generated on our virtual machine. We began the imaging process by powering on the virtual machines to a given snapshot and them immediately powering them down.  After using VMware […]

Continue reading
incognito forensics

Incognito / Private Browsing Forensics Update

Introduction We are currently part way through the data generation process for our incognito browser research. We are testing four different browsers (Internet Explorer, Google Chrome, Safari, and Mozilla Firefox) in both public and private modes using a Windows 7 Virtual Machine. Ultimately, we aim to catalog how much evidence is left behind after an […]

Continue reading

Private Browsing Part 2

Many people use the internet every day. Unfortunately, not everyone uses it legally. Some individuals use the internet for nefarious activities, and they need a way to effectively hide what they did on the internet or a way to stop all information from being written to the hard drive to avoid leaving evidence. Google Chrome, Mozilla Firefox, and Internet Explorer all have something built in called “Private Browsing” that are believed to do just that.

This post will discuss the methods we are using for private browsing forensics, what we have found so far with our analysis, and what we are going to do next. This blog is part 2 of private browsing forensics.

http://www.youtube.com/watch?v=7fvceROojJI

To read the full report, click here: Private Browsing Part 2

Private Browsing Forensics: Introduction

Many people use the internet every day. Unfortunately, not everyone uses it legally. Some individuals use the internet for nefarious activities, and they need a way to effectively hide what they did on the internet or a way to stop all information from being written to the hard drive to avoid leaving evidence. Google ChromeMozilla Firefox, and Internet Explorer all have something built in called “Private Browsing” that are believed to do just that. We want to conduct research to see if these “Private Browsers” can actually hide all traces of internet history and to see what is left behind or recoverable, if anything at all.

http://www.youtube.com/watch?v=qljOwo5oLck

You can view the full blog post here: Private Browsing Forensics: Introduction