Time
4 hours 15 minutes
Difficulty
Beginner
CEU/CPE
4

Video Transcription

00:02
Hello and welcome back to the course in this lab. We're going to analyze the content off Web cache. Be a one, though, that a day Aramis fight that stores cash history and cookies. Information. Internet Explorer 10
00:17
We will use. Yes, eat that iris view a tool developed by curse Off, which is a utility that reads on displaced the day That store inside the extensive list or exchanging diaries
00:32
you will need a Windows eight or 10 operating system environment are with grocer to the low, the tool and a secretive program Social seven. See, we see or were are
00:45
first
00:47
you need to log into Windows machine on open or were, bro. Sir, having here Google chrome owner will loose their environment but feel free to use any bro. Sir,
00:58
search for E. S e that view
01:00
or you can go directly to the website in this guide.
01:04
I don't know the tool and save it and keep it in your computer.
01:18
Go to the folder. See you, sirs. User name up data local Microsoft windows with cash.
01:27
Kobe on paste The file with cash vio one though that into a folder where the tool is located
01:37
note that the operating system may be using this file, so you probably will have to finish the process that issues in this file in the task manager.
01:48
Open the secure A ble years e that I always feel that XY
01:53
in the main window. Select the many file and click on the option open. Yes, E that always filed.
02:01
If you weren't able to copy a file on are tryingto open, you broke a Web cache file. Glicken
02:08
open your KT I e. 10 slash i E. 11 there, Elise. Let's keep the Step nine.
02:17
Select the fire Webcast V. One that that that you previously copied.
02:25
Now you will see the table with visited us on not only the information about the containers but also the path to the fights with the data.
02:36
The information about visitor with pace is contained in the containers to 14 15 and 21.
02:45
Issue cremation that information about what basis they're using has visited in the in private moment is contained in the same container.
02:55
These pages have value. Eight In the column Flax
03:00
information about a user stone loads is stored in the container 22
03:06
that has the name I eat the road
03:09
to export the day that it's played. Click on the menu file in the option safe. All items
03:19
take a moment to analyzed information in the file
03:23
on us for the questions in the guide Social. Where was the last visited Europe
03:29
on if the user visited any side in the private mode?
03:36
We have analyzed how to review the information from the Web. Roser a spark off the pertinent files that every analyst should check in the examination.
03:45
Don't forget to check the references on splintery material are in the next month. We're going to underlie some Windows. Artifacts that are essential will perform in a forensic examination.

Up Next

Windows Forensics and Tools

The Windows Forensics and Tools course focuses on building digital forensics knowledge of Microsoft Windows operating systems, as well as some compatible software or tools that can be used to obtain or process information in such systems.

Instructed By

Instructor Profile Image
Adalberto Jose Garcia
Information Security Analyst at Bigazi
Instructor