Browser Forensics – DFIR Workflow & Cheatsheet
Quick Reference: Investigation Priority Matrix
HIGH
History & Downloads
What sites? When? What files?
Medium
HIGH
Session Restore
Active tabs at incident time?
High
HIGH
Cache
What content viewed? Screenshots?
Medium
MEDIUM
Cookies
Session data? Authentication?
Low
MEDIUM
Auto-Complete Data
What was searched/typed?
Low
MEDIUM
Stored Credentials
What accounts accessed?
Low
LOW
Bookmarks
Sites of interest (may never visit)
Very Low
LOW
Extensions
Capabilities added? Malicious?
Very Low
Investigation Workflow
Phase 1: Initial Triage (High Priority)
Goal: Establish timeline and user activity scope
1.1 Browser History & Download History
What it tells you: Websites visited, frequency, downloaded files, timeline
Firefox Locations:
Chrome/Edge Locations:
Key Investigation Points:
✓ Check ALL profiles (Default, Profile1, Profile2, etc.)
✓ Visit frequency indicates user interest/habit
✓ Download metadata: filename, size, source URL, referring page
✓ Check both
downloadsanddownload_url_chainstables (Chromium)✓ Cross-reference with filesystem timestamps
SQLite Tables to Query:
urls- Browsing historyvisits- Individual visit records with timestampsdownloads- Download metadatadownload_url_chains- Redirect chains
1.2 Session Restore Files
What it tells you: Active browser state at crash/incident time
Firefox Locations:
Chrome/Edge Locations:
Key Investigation Points:
✓ HIGHLY VOLATILE - Capture early in investigation
✓ Shows tabs open at time of incident/crash
✓ Includes referring URLs (how user got there)
✓ May contain form data, JavaScript state
✓ Browser window configuration (size, pinned tabs)
✓ Tab transition types reveal navigation method
Phase 2: Content Analysis (Medium Priority)
Goal: Understand what content user actually viewed
2.1 Cache Files
What it tells you: Actual webpage content, images, media viewed
Firefox Locations:
Chrome/Edge Locations:
Key Investigation Points:
✓ Provides "snapshot in time" of viewed content
✓ Recover actual images, videos, documents
✓ Timestamps: first cached AND last viewed
✓ Can reconstruct pages even if history cleared
✓ Tied to specific local user account
✓ Use specialized tools (NirSoft ChromeCacheView, MZCacheView)
2.2 Media History (Chromium Only)
What it tells you: Audio/video played on websites
Chrome/Edge Locations:
Key Investigation Points:
✓ Three primary tables:
playback,playbackSession,origin✓ URLs of media played
✓ Watch time duration
✓ Last video position (where user stopped)
✓ Last play time
⚠️ Unclear persistence when other history cleared
Phase 3: User Behaviour & Intent (Medium Priority)
Goal: Understand user searches, inputs, and interests
3.1 Auto-Complete Data
What it tells you: User searches, form inputs, typed URLs
Firefox Locations:
Chrome/Edge Locations - By Data Type:
Search Terms:
Web Form Data:
Omnibox (URL Bar) Entries:
Keystroke-Level Recording:
Login Credentials:
Key Investigation Points:
✓ Shows user knowledge and intent
✓ Connects typed data to user account
✓ Search terms reveal investigation targets
✓ Network Action Predictor = keystroke logger
✓ Form data may include PII, credentials
3.2 Cookies
What it tells you: Session data, authentication tokens, tracking
Firefox Locations:
Chrome/Edge Locations:
Key Investigation Points:
✓ Confirms website visits
✓ Session authentication tokens
✓ User preferences and settings
✓ Tracking/advertising IDs
✓ Creation and expiration times
✓ May persist after history clearing
Phase 4: Configuration & Credentials (Low-Medium Priority)
Goal: Understand browser setup and account access
4.1 Stored Credentials
What it tells you: Saved usernames/passwords for websites
Firefox Locations:
Chrome/Edge Locations:
Key Investigation Points:
✓ Encrypted via Windows DPAPI
✓ Firefox: JSON format with hostname, URL, creation time, last used
✓ Chrome/Edge: SQLite with origin URL, username, date created/used
⚠️ Win 10/11 Microsoft accounts: DPAPI uses 44-char random password
✓ Metadata available even if passwords encrypted
✓ Best retrieved on live system with user logged in
✓ Shows accounts user accessed
4.2 Browser Preferences
What it tells you: Privacy settings, sync status, user engagement
Firefox Locations:
Chrome/Edge Locations:
Key Investigation Points:
✓ Firefox: Sync status, last sync time, artifacts synced
✓ Chrome/Edge: JSON format
per_host_zoom_levels- Sites frequently visitedmedia-engagement- Media interaction scoressite_engagement- Overall site interaction
✓ Edge:
account_info,clear_data_on_exit, sync settings✓ Privacy settings (anti-tracking, cookie policies)
✓ Sync can move artifacts across devices - check timestamps carefully
Phase 5: Supporting Artifacts (Low Priority)
5.1 Bookmarks
What it tells you: Sites of interest (not necessarily visited)
Firefox Locations:
Chrome/Edge Locations:
Key Investigation Points:
✓ JSON format (Firefox backups, all Chromium)
✓ Shows intent/interest, not necessarily activity
⚠️ Not all bookmarks are user-generated (defaults exist)
⚠️ Can bookmark without visiting
✓ Firefox: Multiple backup copies in bookmarkbackups folder
✓ Check .bak files for deleted bookmarks
5.2 Extensions & Add-ons
What it tells you: Added capabilities, potential malware vector
Firefox Locations:
Chrome/Edge Locations:
Key Investigation Points:
✓ Firefox: Name, source, install time, last update, status
✓ Chrome/Edge: Each extension in GUID-named folder
Folder creation time = installation time
manifest.json= name, URL, permissions, version
✓ Check Preferences file for additional extension data
⚠️ Extensions can sync across devices (affects timestamp interpretation)
✓ Look for suspicious permissions (screen capture, keylogging, etc.)
✓ Cross-reference with known malicious extensions
Critical Investigation Tips
Multi-Profile Awareness
Timestamp Interpretation
Data Persistence Hierarchy
Anti-Forensics Detection
Live System vs. Dead Disk
Essential DFIR Tools
SQLite Browsers
DB Browser for SQLite - View/query .sqlite files
SQLite Forensic Explorer - Deleted record recovery
Browser-Specific Tools
Hindsight - Chrome/Chromium timeline analysis
NirSoft BrowsingHistoryView - Multi-browser history
NirSoft ChromeCacheView - Cache file extraction
NirSoft MZCacheView - Firefox cache extraction
Firefox Forensics Toolkit
Comprehensive Suites
Magnet AXIOM - Full browser artifact processing
X-Ways Forensics - Browser artifact templates
Autopsy - Open-source browser modules
KAPE - Browser artifact collection targets
Manual Analysis
Quick Command Reference
Identify Browser Profiles
Collect All Browser Artifacts (PowerShell)
Hash Browser Databases (Before Analysis)
Investigation Checklist
Initial Response
[ ] Identify all user accounts on system
[ ] Identify all browsers installed
[ ] Document current date/time and timezone
[ ] Check if users currently logged in (live system)
[ ] Capture volatile session restore files FIRST
Data Collection
[ ] Collect all browser profiles (not just Default)
[ ] Hash all databases before opening
[ ] Document sync settings and last sync times
[ ] Check for browser backup/cleaning tools
[ ] Capture browser process memory (if live)
Analysis
[ ] Establish baseline timeline from history
[ ] Correlate downloads with filesystem artifacts
[ ] Cross-reference cookies with history
[ ] Check auto-complete for searches related to incident
[ ] Review extensions for malicious/suspicious capabilities
[ ] Analyse session restore for incident timeframe
[ ] Examine cache for evidence of viewed content
Reporting
[ ] Timeline of relevant browsing activity
[ ] Downloads tied to incident
[ ] Search terms indicating intent
[ ] Websites accessed related to case
[ ] Evidence of anti-forensics
[ ] Account credentials discovered
[ ] Screenshots/content from cache
File Path Environment Variables
Notes & Gotchas
Chrome Timestamp Format: Microseconds since January 1, 1601 (Windows FILETIME)
Firefox JSONLZ4: Requires special decompression (mozlz4 library)
DPAPI Encryption: Tied to user account; decrypt on live system while logged in
Profile Sync: Can move artifacts between devices - verify device origin
Private/Incognito: Leaves NO browser artifacts (check RAM, pagefile, network logs)
Extensions Storage: Some extensions have their own databases with user data
Service Workers: May cache data outside standard cache locations
Browser Version Matters: Artifact locations change between major versions
Chromium Variants: Brave, Opera, Vivaldi use similar structures to Chrome
Mobile Browsers: Different artifact locations (not covered here)
Last updated