Search K
Appearance
Appearance
Other ways to support HackTricks:
Use Trickest to easily build and automate workflows powered by the world's most advanced community tools.
Get Access Today:
Browser artifacts include various types of data stored by web browsers, such as navigation history, bookmarks, and cache data. These artifacts are kept in specific folders within the operating system, differing in location and name across browsers, yet generally storing similar data types.
Here's a summary of the most common browser artifacts:
Firefox organizes user data within profiles, stored in specific locations based on the operating system:
~/.mozilla/firefox/
/Users/$USER/Library/Application Support/Firefox/Profiles/
%userprofile%\AppData\Roaming\Mozilla\Firefox\Profiles\
A profiles.ini
file within these directories lists the user profiles. Each profile's data is stored in a folder named in the Path
variable within profiles.ini
, located in the same directory as profiles.ini
itself. If a profile's folder is missing, it may have been deleted.
Within each profile folder, you can find several important files:
Additionally, checking the browserโs anti-phishing settings can be done by searching for browser.safebrowsing
entries in prefs.js
, indicating whether safe browsing features are enabled or disabled.
To try to decrypt the master password, you can use https://github.com/unode/firefox_decrypt
With the following script and call you can specify a password file to brute force:
#!/bin/bash
#./brute.sh top-passwords.txt 2>/dev/null | grep -A2 -B2 "chrome:"
passfile=$1
while read pass; do
echo "Trying $pass"
echo "$pass" | python firefox_decrypt.py
done < $passfile
Google Chrome stores user profiles in specific locations based on the operating system:
~/.config/google-chrome/
C:\Users\XXX\AppData\Local\Google\Chrome\User Data\
/Users/$USER/Library/Application Support/Google/Chrome/
Within these directories, most user data can be found in the Default/ or ChromeDefaultData/ folders. The following files hold significant data:
grep 'safebrowsing' ~/Library/Application Support/Google/Chrome/Default/Preferences
. Look for {"enabled: true,"}
in the output.As you can observe in the previous sections, both Chrome and Firefox use SQLite databases to store the data. It's possible to recover deleted entries using the tool sqlparse or sqlparse_gui.
Internet Explorer 11 manages its data and metadata across various locations, aiding in separating stored information and its corresponding details for easy access and management.
Metadata for Internet Explorer is stored in %userprofile%\Appdata\Local\Microsoft\Windows\WebCache\WebcacheVX.data
(with VX being V01, V16, or V24). Accompanying this, the V01.log
file might show modification time discrepancies with WebcacheVX.data
, indicating a need for repair using esentutl /r V01 /d
. This metadata, housed in an ESE database, can be recovered and inspected using tools like photorec and ESEDatabaseView, respectively. Within the Containers table, one can discern the specific tables or containers where each data segment is stored, including cache details for other Microsoft tools such as Skype.
The IECacheView tool allows for cache inspection, requiring the cache data extraction folder location. Metadata for cache includes filename, directory, access count, URL origin, and timestamps indicating cache creation, access, modification, and expiry times.
Cookies can be explored using IECookiesView, with metadata encompassing names, URLs, access counts, and various time-related details. Persistent cookies are stored in %userprofile%\Appdata\Roaming\Microsoft\Windows\Cookies
, with session cookies residing in memory.
Downloads metadata is accessible via ESEDatabaseView, with specific containers holding data like URL, file type, and download location. Physical files can be found under %userprofile%\Appdata\Roaming\Microsoft\Windows\IEDownloadHistory
.
To review browsing history, BrowsingHistoryView can be used, requiring the location of extracted history files and configuration for Internet Explorer. Metadata here includes modification and access times, along with access counts. History files are located in %userprofile%\Appdata\Local\Microsoft\Windows\History
.
Typed URLs and their usage timings are stored within the registry under NTUSER.DAT
at Software\Microsoft\InternetExplorer\TypedURLs
and Software\Microsoft\InternetExplorer\TypedURLsTime
, tracking the last 50 URLs entered by the user and their last input times.
Microsoft Edge stores user data in %userprofile%\Appdata\Local\Packages
. The paths for various data types are:
C:\Users\XX\AppData\Local\Packages\Microsoft.MicrosoftEdge_XXX\AC
C:\Users\XX\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat
C:\Users\XX\AppData\Local\Packages\Microsoft.MicrosoftEdge_XXX\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\XXX\DBStore\spartan.edb
C:\Users\XXX\AppData\Local\Packages\Microsoft.MicrosoftEdge_XXX\AC#!XXX\MicrosoftEdge\Cache
C:\Users\XX\AppData\Local\Packages\Microsoft.MicrosoftEdge_XXX\AC\MicrosoftEdge\User\Default\Recovery\Active
Safari data is stored at /Users/$User/Library/Safari
. Key files include:
history_visits
and history_items
tables with URLs and visit timestamps. Use sqlite3
to query.plutil
or pluginkit
to retrieve.plutil
to parse.plutil
to parse.defaults read com.apple.Safari WarnAboutFraudulentWebsites
. A response of 1 indicates the feature is active.Opera's data resides in /Users/$USER/Library/Application Support/com.operasoftware.Opera
and shares Chrome's format for history and downloads.
fraud_protection_enabled
in the Preferences file is set to true
using grep
.These paths and commands are crucial for accessing and understanding the browsing data stored by different web browsers.
Use Trickest to easily build and automate workflows powered by the world's most advanced community tools.
Get Access Today:
Other ways to support HackTricks: