Skip to content

sumith97/Forensic-Analysis-of-Android-Privacy-Browser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Forensic Analysis of Android Privacy Browser

Step 1: Setup a Android X86 on Virtual Machine.
Step 2: Install Privacy Browser.
Step 3: Perform test script on browser as per report.
Step 4: Close the browser and shut down the VM.
Step 5: Use the Virtual Disk of VM to generate encase forensic file using FTK Imager Tool.
Step 6: Use Bulk Extractor tool to generate raw data results in the form of text-based artifact files.


Command to generate text based artifact files: bulk_extractor -o output-directory target-image

Artifacts_Terminal_View.py uses this text based artifact folder as input and searches for the browser artifacts generated by browser while running our test script. The output is printed in Terminal

Browser_Excel_Generates.py does the same activity but outputs the browser artifacts results properly for analysis in excel sheets

Please go through Report.pdf for detail explaination of lab environment setup, Browser Test script and code explanation

The report also has analysis on 8 popular Android browsers, Google Chrome, Mozilla Firefox & Firefox Focus, Opera, TOR, Brave, DuckDuckGo and Dolphin.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages