Posts Tagged ‘SQLite forensics’

Most Recent
 
Read More
2018-07-19

An Overview of Web Browser Forensics

Browser Forensics Analysis is a separate, large area of ​​expertise.

 

Web browsers are used in mobile devices, tablets, netbooks, desktops, etc., and often can be used not just for web surfing, but for navigation through the file system of the device. The web browser’s cache can contain downloaded images, videos, documents, executable files and scripts. Web browsers also can contain data entered into forms: search queries, logins and passwords for web email accounts, social networks, other web sites and financial information (for example, credit card numbers). Favorites and searches can give the researcher an idea of ​​the device owner’s interests.

11017
 
Read More
2017-11-28

SQLite and Plist Files

The specialized tools for viewing various file formats greatly simplify the examination of the analysis.

First of all, SQLite is an open source and is widely used when it comes to mobile devices. SQLite databases are widely used by the iOS developer community. All data is stored in SQLite databases associated with applications (calendar, text messages, notes, photos and address book).

 

920
 
Read More
2017-10-25

SQLite Miner Overview

This script mines SQLite databases for hidden gems that might be overlooked. It identifies for the forensic examiner which databases, tables, and columns had which potential types of files within them.

 

172
 
Read More
2017-09-07

SQLite Analysis with X-Ways Forensic

This article presents an analysis of the SQLite database using X-Ways. The author of this blog is not an expert in the SQLite database.

 

330
Latest Headlines
 
Read More
660
 
Read More
368
 
Read More
731

Trending Topics
digital forensics
computer forensics
Articles
mobile forensics
DFIR
digital forensics software
Android forensics
windows forensics
incident response
Top Stories
 
 
Right Now
 
bstrings 1.0 released
Top Five
Heat Index
 
1
Decrypting encrypted WhatsApp databases without the key
 
2
How to Make the Forensic Image of the Hard Drive
 
3
Extracting data from SmartSwitch backups
 
4
Forensic tools for your Mac
 
5
An Overview of Web Browser Forensics