Sunday, November 1, 2015

FireFox 41.0.1 Browsing session analysis

In this series I will spend some time analyzing the data stored in a FireFox portable v41.0.1 browsing session.
 

FireFox portable was installed on a 2GB flash drive. From this potable drive, Firefox was executed and all Internet activities performed.

The following sites were visited:
google.com
    searched for "securitynik dnsspoof" and clicked the first link
    downloaded the dnsspoof script

Forms
    mymail.forsythe.com
    added my username and password
   
images.google.com
    searched "map of canada"
    downloaded the first images
   

https://www.youtube.com/
    clicked the first video
    https://www.youtube.com/watch?v=bl-foyTBzXo&spfreload=9
   
   
github
https://github.com/SecurityNik/QRadar---Threat-Intelligence-On-The-Cheap

exited firefox v41.0.1.

Now see you in the next post where we create a forensic copy of the drive using dc3dd



Other posts in this series:




References:
FireFox Portable

No comments:

Post a Comment