Browser Forensics Analysis is a separate, large area of expertise.
Web browsers are used in mobile devices, tablets, netbooks, desktops, etc., and often can be used not just for web surfing, but for navigation through the file system of the device. The web browser’s cache can contain downloaded images, videos, documents, executable files and scripts. Web browsers also can contain data entered into forms: search queries, logins and passwords for web email accounts, social networks, other web sites and financial information (for example, credit card numbers). Favorites and searches can give the researcher an idea of the device owner’s interests.
The specialized tools for viewing various file formats greatly simplify the examination of the analysis.
First of all, SQLite is an open source and is widely used when it comes to mobile devices. SQLite databases are widely used by the iOS developer community. All data is stored in SQLite databases associated with applications (calendar, text messages, notes, photos and address book).
This script mines SQLite databases for hidden gems that might be overlooked. It identifies for the forensic examiner which databases, tables, and columns had which potential types of files within them.