It is hard to imagine a case where web browser artifacts are useless. Child abuse material, intellectual property theft, cyber harassment, malware - browser artifacts will help to solve all sorts of cases. Nowadays, a huge number of web browsers are available. Some provide their users with increased privacy options, others do not. But even if the suspect uses a private browser, such as notorious Tor, a computer forensic examiner is able to extract some data, for example from swap and hibernation files (check the last recipe in this chapter) or a memory dump.
In this chapter, we will show you how to perform web browser forensics with some forensic tools you have already dealt with, such as Magnet AXIOM and Belkasoft Evidence Center, and some new ones, such as BlackBag's BlackLight.
Finally, you will learn how to defeat some anti-forensic techniques using swap...